All Courses
Cybersecurity Beginner

UniCyber Bootcamp

UniCyber Bootcamp

Abdalla AbuAli 12 hours 44 enrolled 104 lessons
Earn 60 points upon completion
UniCyber Bootcamp

Free

104 lessons
12 hours total
Access on any device
Lifetime access

About This Course

UniCyber Bootcamp

Course Content 6 topics · 104 lessons

1. Introduction

Video · 5m

Preview

2. Network Definition & Types

Video · 4m

3. IP Address

Video · 7m

4. Public VS Private IP Address

Video · 5m

5. Numeral System

Video · 5m

6. Decimal to Binary Conversions

Video · 6m

7. Subnet Mask

Video · 14m

8. Examples of Subnet Mask

Video · 12m

9. Network Address Translation & Types

Video · 11m

10. MAC Address

Video · 5m

11. Casting & Transmission mode

Video · 5m

12. OSI & TCP/IP model

Video · 5m

13. OSI model (Application & Session & Presentation)

Video · 5m

14. OSI model (Transport Layer & TCP VS UDP)

Video · 5m

15. OSI model (Network Layer)

Video · 5m

16. OSI Model (Data & Physical Layer)

Video · 5m

17. Socket & Port Number

Video · 5m

18. Domain Name System (DNS)

Video · 5m

19. How Can We obtain an IP Address

Video · 5m

20. Address Resolution Protocol (ARP)

Video · 5m

21. Network Devices (Hub & Switch & Router)

Video · 5m

22. VLAN

Video · 5m

23. Firewall

Video · 5m

24. Demilitarized Zone (DMZ)

Video · 5m

25. Virtual Private Network (VPN)

Video · 5m

26. Proxy Server

Video · 3m

27. Tor Network

Video · 6m

28. What is the URL

Video · 5m

29. How HTTP Works

Video · 7m

30. HTTP Status Messages

Video · 5m

31. HTTP Vs HTTPs

Video · 5m

32. Cookie Vs Session

Video · 5m

33. Interpreter Vs Compiler

Video · 4m

34. Text Editor , Code Editor & IDE

Video · 6m

35. Escape Sequence

Video · 3m

36. Variables & Data Type

Video · 12m

37. Basic Arithmetic

Video · 7m

38. Prefix & Postfix

Video · 4m

39. Variable Scope

Video · 5m

40. Selection Statement

Video · 5m

41. Logical Operators

Video · 5m

42. Selection Statement with Logical Operators

Video · 6m

43. Switch

Video · 5m

44. While Loop

Video · 5m

45. For Loop

Video · 5m

46. Do While Loop

Video · 5m

47. Break and Continue

Video · 4m

48. Nested Loop

Video · 5m

49. Function

Video · 5m

50. Bulit-in Function (Math)

Video · 3m

51. Bulit-in Function (Algorithms)

Video · 5m

52. Call By Reference VS Call By Value

Video · 5m

53. Function (Recursion)

Video · 6m

54. Array - Part1

Video · 6m

55. Array - Part2

Video · 7m

56. What is Kali Linux

Video · 5m

57. Download Virtual Machine

Video · 6m

58. Basic Command - Part 1

Video · 5m

59. Basic Command - Part 2

Video · 5m

60. Relative Path VS Absolute Path

Video · 3m

61. Root User

Video · 4m

62. Basic Command - Part 3

Video · 2m

63. Package Manager (APT)

Video · 2m

64. Permission in Linux

Video · 5m

65. Basic Command - Part 4

Video · 5m

66. Extracting Compressed Files + Working with GitHub

Video · 5m

67. Redirection in Linux

Video · 4m

68. Information Security vs Cyber Security

Video · 5m

69. Cyber Security: CIA Triad

Video · 7m

70. Information Security Terminology

Video · 5m

71. Types of Threat Actor

Video · 5m

72. Security Principles for Defenses

Video · 5m

73. Viruses Vs Worm

Video · 5m

74. Trojan and Ransomware

Video · 5m

75. Rootkits

Video · 3m

76. Spyware, Key loggers and Adware

Video · 5m

77. Logic Bomb and Backdoor

Video · 5m

78. DDOS Attack and Zombie

Video · 5m

79. Social Engineering

Video · 5m

80. Man in the Middle Attack

Video · 8m

81. Privilege Escalation

Video · 5m

82. Cross-Site Scripting (XSS)

Video · 9m

83. SQL Injection

Video · 5m

84. Buffer Overflow Attack

Video · 5m

85. Cryptography

Video · 5m

86. Asymmetric Vs Symmetric Encryption

Video · 8m

87. What is Penetration Testing

Video · 5m

88. Information Gathering - Part 1

Video · 5m

89. Information Gathering - Part 2

Video · 5m

90. Scanning and Fingerprinting

Video · 5m

91. TryHackMe

Video · 5m

92. NMAP

Video · 5m

93. Vulnerability Assessment

Video · 5m

94. Exploitation

Video · 5m

95. Web Application Attack

Video · 5m

96. Gobuster

Video · 5m

97. Wireshark

Video · 5m

98. John The Ripper

Video · 5m

99. Burp Suite

Video · 5m

100. Hydra

Video · 5m

101. Metasploit Framework

Video · 5m

102. RootMe-Tryhackme

Video · 5m

103. Blue-Tryhackme

Video · 5m

104. Brooklyn Nine Nine-Tryhackme

Video · 5m

Your Instructor

Abdalla AbuAli

1 courses