Loading ...

Course / Course Details

Cyber Security – Complete Course

  • Zaalima Learning image

    By - Zaalima Learning

  • 0 students
  • 40 Hours
  • (0)

Course Requirements

Before enrolling in this course, learners should have:

  • Basic knowledge of computers and operating systems

  • Basic understanding of networking concepts

  • Familiarity with the internet and web technologies

  • A computer with at least 8GB RAM recommended

  • Ability to install software and virtual machines

  • Willingness to practice security tools and labs

Recommended (Optional):

  • Basic knowledge of Linux

  • Interest in ethical hacking and security research

Course Description

This course provides a comprehensive introduction to Cyber Security, focusing on protecting systems, networks, and data from cyber threats. Students will learn the fundamentals of information security, ethical hacking, network security, cryptography, and risk management.

The course combines theoretical knowledge with practical tools and real-world case studies to help learners understand how cyber attacks occur and how to defend against them. By the end of the course, learners will gain hands-on experience with security tools, vulnerability assessment, and basic penetration testing techniques.

Course Outcomes

After completing this course, learners will be able to:

  1. Understand the fundamental concepts of cyber security and information protection.

  2. Identify common cyber threats, attacks, and vulnerabilities.

  3. Apply basic security practices to protect systems and networks.

  4. Use security tools such as Nmap, Wireshark, and Kali Linux.

  5. Perform basic vulnerability assessments and penetration testing.

  6. Understand cryptographic techniques used in secure communication.

  7. Analyze web application vulnerabilities and mitigation strategies.

  8. Respond to cyber incidents and implement security best practices.

  9. Understand cyber laws, ethics, and professional responsibilities in cybersecurity.

  10. Build a foundation for advanced studies in ethical hacking, digital forensics, and security analysis.

Course Curriculum

  • 31 chapters
  • 147 lectures
  • 0 quizzes
  • 40 Hours total length
Toggle all chapters
1 About the course
1 Min


1 About VMware and Virtualbox
2 Min


2 Preparation
4 Min


3 Virtualbox Installation
4 Min


4 Vmware Installation
4 Min


1 Intro to Recon
6 Min


2 Gedit
7 Min


3 Amass
5 Min


4 Sublist3r
6 Min


5 Dirb & Burp
8 Min


6 nikto
2 Min


7 dig
6 Min


8 wpscan
4 Min


9 Shodan
26 Min


10 Identifying Webstack
5 Min


1 URL Introduction
4 Min


2 URL Challenge #1
4 Min


3 URL Challenge #2
5 Min


4 URL Challenge #3
5 Min


5 URL Challenge #4
3 Min


6 URL Challenge #5
4 Min


7 Juice-Shop
8 Min


1 IDOR & BL 1
11 Min


2 IDOR & BL 2
11 Min


3 IDOR & BL 3
6 Min


4 IDOR & BL 4
7 Min


5 IDOR & BL 5
4 Min


6 IDOR & BL 6
6 Min


7 IDOR & BL 7
3 Min


8 IDOR & BL 8
6 Min


9 IDOR & BL 9
7 Min


10 IDOR & BL 10
4 Min


11 IDOR & BL 11
6 Min


12 IDOR & BL 12
3 Min


1 SQL Injection 1
17 Min


2 SQL Injection 2
8 Min


3 SQL Injection 3
8 Min


4 SQL Injection 4
7 Min


5 SQL Injection 5
4 Min


6 SQL Injection 6
5 Min


7 SQL Injection 7
12 Min


8 SQL Injection 8
9 Min


9 SQL Injection 9
23 Min


10 SQL Injection 10
7 Min


11 SQL Injection 11
3 Min


1 Path Traversal Intro
4 Min


2 Path Traversal #1
4 Min


3 Path Traversal #2
2 Min


4 Path Traversal #3
4 Min


5 Path Traversal #4
4 Min


6 Path Traversal #5
4 Min


1 XXE #1
9 Min


2 XXE #2
16 Min


3 XXE #3
3 Min


1 xss 1
10 Min


2 xss 2
4 Min


3 xss 3
4 Min


4 xss 4
4 Min


5 xss 5
5 Min


1 Basic Networking
11 Min


1 Bash 1
41 Min


1 Basic Python
56 Min


2 Tool 1
56 Min


1 01. HTML 1
4 Min


2 HTML 2
3 Min


3 HTML 3
3 Min


4 HTML 4
4 Min


5 HTML 5
3 Min


6 HTML 6
5 Min


7 HTML 7
8 Min


8 HTML 8
7 Min


9 HTML 9
6 Min


10 HTML 10
5 Min


1 Javascript 1
2 Min


2 Javascript 2
2 Min


3 Javascript 3
2 Min


4 Javascript 4
5 Min


1 file upload
22 Min


1 Command Injection
26 Min


1 SSRF
22 Min


1 LFI RFI
15 Min


1 JWT
21 Min


1 WPintro
24 Min


1 Nmap
7 Min


2 Gobuster
6 Min


3 SSH
3 Min


4 GitHub
6 Min


1 HackTheBox
3 Min


2 Port Scan
2 Min


3 Port 21 FTP
4 Min


4 FTP Enumeration And Exploitation
9 Min


5 Port 53 DNS
5 Min


6 Port 139445 SMB
4 Min


7 Port 80 HTTP
2 Min


1 Devel
8 Min


2 Beep
14 Min


3 Mirai
6 Min


4 Valentine
20 Min


5 Validation
18 Min


6 Shocker
8 Min


1 Powershell IEX
3 Min


2 Evil-Winrm
4 Min


3 Smbserver
4 Min


4 Certutil
3 Min


1 About Windows Enumeration
4 Min


2 System Info
4 Min


3 Whoami
3 Min


4 Additional Ports
3 Min


5 Stored Passwords
4 Min


6 Stored Passwords #2
1 Min


7 Winpeas
4 Min


1 Gaining Shell For Practice
5 Min


2 Exploit 1
6 Min


3 Exploit 2
4 Min


4 Exploit 3
8 Min


5 Exploit 4
4 Min


1 Simple HTTPServer
2 Min


2 Linpeas.sh
4 Min


3 Cron Job #1
6 Min


4 Cron Job #2
6 Min


5 Etcshadow
8 Min


6 mysql
4 Min


7 Password Hunting
3 Min


8 SUID
5 Min


9 Practice Bank HTB
6 Min


10 Practice Bank #2
20 Min


1 Devel Kernel Exploit With Metasploit
6 Min


2 Valentine Kernel Exploit (Linux)
8 Min


1 Intro to AD
2 Min


2 SMB More Enumeration
7 Min


3 SMB More Enumeration 2
6 Min


4 Kerberoasting
8 Min


5 PSexec
3 Min


6 Querior AD Walkthrough
29 Min


7 Sauna AD Foothold
13 Min


8 Sauna with Bloodhound
11 Min


1 Introduction
1 Min


2 Getting Started
3 Min


3 Fuzzing
5 Min


4 Finding Offset
3 Min


5 Controlling EIP
2 Min


6 Finding Bad Characters
5 Min


7 Setting JMP
5 Min


8 Getting Shell
4 Min


1 Building a Portfolio part 1
34 Min


2 Building Portfolio Part 2
24 Min


3 Building Portfolio Part 3
22 Min


Instructor

Zaalima Learning

As the Super Admin of our platform, I bring over a decade of experience in managing and leading digital transformation initiatives. My journey began in the tech industry as a developer, and I have since evolved into a strategic leader with a focus on innovation and operational excellence. I am passionate about leveraging technology to solve complex problems and drive organizational growth. Outside of work, I enjoy mentoring aspiring tech professionals and staying updated with the latest industry trends.

5 Rating
1 Reviews
1 Students
5 Courses

Course Full Rating

0

Course Rating
(0)
(0)
(0)
(0)
(0)

No Review found

Sign In or Sign Up as student to post a review

Student Feedback

Course you might like

Intermediate
Data Science & Machine Learning Complete Course
5 (1 Rating)
This comprehensive Machine Learning course in Python and R is designed to help you master core ML concepts and real-worl...
Beginner
Python Complete Course
0 (0 Rating)
The Python Complete Course is designed to take you from beginner to advanced level in Python programming. This course co...

You must be enrolled to ask a question

Students also bought

More Courses by Author

Discover Additional Learning Opportunities