UniCyber Bootcamp
UniCyber Bootcamp
Free
About This Course
UniCyber Bootcamp
Course Content 6 topics · 104 lessons
1. Introduction
Video · 5m
2. Network Definition & Types
Video · 4m
3. IP Address
Video · 7m
4. Public VS Private IP Address
Video · 5m
5. Numeral System
Video · 5m
6. Decimal to Binary Conversions
Video · 6m
7. Subnet Mask
Video · 14m
8. Examples of Subnet Mask
Video · 12m
9. Network Address Translation & Types
Video · 11m
10. MAC Address
Video · 5m
11. Casting & Transmission mode
Video · 5m
12. OSI & TCP/IP model
Video · 5m
13. OSI model (Application & Session & Presentation)
Video · 5m
14. OSI model (Transport Layer & TCP VS UDP)
Video · 5m
15. OSI model (Network Layer)
Video · 5m
16. OSI Model (Data & Physical Layer)
Video · 5m
17. Socket & Port Number
Video · 5m
18. Domain Name System (DNS)
Video · 5m
19. How Can We obtain an IP Address
Video · 5m
20. Address Resolution Protocol (ARP)
Video · 5m
21. Network Devices (Hub & Switch & Router)
Video · 5m
22. VLAN
Video · 5m
23. Firewall
Video · 5m
24. Demilitarized Zone (DMZ)
Video · 5m
25. Virtual Private Network (VPN)
Video · 5m
26. Proxy Server
Video · 3m
27. Tor Network
Video · 6m
28. What is the URL
Video · 5m
29. How HTTP Works
Video · 7m
30. HTTP Status Messages
Video · 5m
31. HTTP Vs HTTPs
Video · 5m
32. Cookie Vs Session
Video · 5m
33. Interpreter Vs Compiler
Video · 4m
34. Text Editor , Code Editor & IDE
Video · 6m
35. Escape Sequence
Video · 3m
36. Variables & Data Type
Video · 12m
37. Basic Arithmetic
Video · 7m
38. Prefix & Postfix
Video · 4m
39. Variable Scope
Video · 5m
40. Selection Statement
Video · 5m
41. Logical Operators
Video · 5m
42. Selection Statement with Logical Operators
Video · 6m
43. Switch
Video · 5m
44. While Loop
Video · 5m
45. For Loop
Video · 5m
46. Do While Loop
Video · 5m
47. Break and Continue
Video · 4m
48. Nested Loop
Video · 5m
49. Function
Video · 5m
50. Bulit-in Function (Math)
Video · 3m
51. Bulit-in Function (Algorithms)
Video · 5m
52. Call By Reference VS Call By Value
Video · 5m
53. Function (Recursion)
Video · 6m
54. Array - Part1
Video · 6m
55. Array - Part2
Video · 7m
56. What is Kali Linux
Video · 5m
57. Download Virtual Machine
Video · 6m
58. Basic Command - Part 1
Video · 5m
59. Basic Command - Part 2
Video · 5m
60. Relative Path VS Absolute Path
Video · 3m
61. Root User
Video · 4m
62. Basic Command - Part 3
Video · 2m
63. Package Manager (APT)
Video · 2m
64. Permission in Linux
Video · 5m
65. Basic Command - Part 4
Video · 5m
66. Extracting Compressed Files + Working with GitHub
Video · 5m
67. Redirection in Linux
Video · 4m
68. Information Security vs Cyber Security
Video · 5m
69. Cyber Security: CIA Triad
Video · 7m
70. Information Security Terminology
Video · 5m
71. Types of Threat Actor
Video · 5m
72. Security Principles for Defenses
Video · 5m
73. Viruses Vs Worm
Video · 5m
74. Trojan and Ransomware
Video · 5m
75. Rootkits
Video · 3m
76. Spyware, Key loggers and Adware
Video · 5m
77. Logic Bomb and Backdoor
Video · 5m
78. DDOS Attack and Zombie
Video · 5m
79. Social Engineering
Video · 5m
80. Man in the Middle Attack
Video · 8m
81. Privilege Escalation
Video · 5m
82. Cross-Site Scripting (XSS)
Video · 9m
83. SQL Injection
Video · 5m
84. Buffer Overflow Attack
Video · 5m
85. Cryptography
Video · 5m
86. Asymmetric Vs Symmetric Encryption
Video · 8m
87. What is Penetration Testing
Video · 5m
88. Information Gathering - Part 1
Video · 5m
89. Information Gathering - Part 2
Video · 5m
90. Scanning and Fingerprinting
Video · 5m
91. TryHackMe
Video · 5m
92. NMAP
Video · 5m
93. Vulnerability Assessment
Video · 5m
94. Exploitation
Video · 5m
95. Web Application Attack
Video · 5m
96. Gobuster
Video · 5m
97. Wireshark
Video · 5m
98. John The Ripper
Video · 5m
99. Burp Suite
Video · 5m
100. Hydra
Video · 5m
101. Metasploit Framework
Video · 5m
102. RootMe-Tryhackme
Video · 5m
103. Blue-Tryhackme
Video · 5m
104. Brooklyn Nine Nine-Tryhackme
Video · 5m
Your Instructor