Srbija Posted February 12 #1 Posted February 12 The Complete Hands-On Cybersecurity Analyst Course Published 2/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 44.72 GB | Duration: 55h 45m Hands On Practical Experience What you'll learn A wide range of cybersecurity skills including basic through advanced skills; ranging from Linux basics to penetration testing and malware analysis. How to build home lab virtual environments for hands-on learning, testing tools safely, enhancing skills, and simulating real-world cybersecurity scenarios. Incident response skills required to quickly detect, contain, investigate, and mitigate cyber threats to minimize damage and ensure recovery. Practical experience from projects and labs that can be added to resume/cv and portfolios. Threat detection and analysis, incident response and management, use of SIEM and event management tools, network monitoring and forensics, and pentesting. Requirements Desire to learn cybersecurity skills. Access to a computer that can support running multiple virtual machines. Recommend at least 16GB of RAM. Description Are you ready to level up and gain hands on experience in cybersecurity? Introducing The Complete Cybersecurity Analyst Course-your one-stop solution for mastering the skills and gain hands on experience you need to excel in the cybersecurity field. Our goal is to provide everything into one course that includes a wide range of opportunities to increase your knowledge and gain that critical hands-on experience. We will not break up essential knowledge into multiple, expensive modules, this course gives you everything you need in one comprehensive package at a one-time low cost. This course features:All-in-One Access: We cover everything from the basics of cybersecurity to advanced threat analysis, network security, incident response, ethical hacking, and more. No need to purchase multiple courses; it's all here!A la carte menu: This course has something for everyone. Pick and choose your lessons based on your interests and experience level.Regular Content Updates: Cybersecurity is an ever-evolving field, and so is this course. Enjoy new content added regularly to keep your skills sharp and up-to-date with the latest industry trends. Lifetime Access: Your learning journey doesn't have an expiration date. With lifetime access, you can revisit the material anytime you need a refresher or when new modules are released. Learn at your own pace, on your schedule.Access to Updated Content: The course authors will continue to add lessons, projects, and other opportunities to gain hands-on experience and you will automatically have access to the new material with no added cost. Expert Instructors: Gain insights from seasoned cybersecurity professionals who bring real-world experience and actionable knowledge to the virtual classroom.Don't miss out on this opportunity to unlock your full potential as a cybersecurity analyst without breaking the bank. Enroll in The Complete Hands-On Cybersecurity Analyst Course today and start your journey towards a secure, rewarding career in cybersecurity!One of the unique features of this course is emphasis on hands-on learning. Theory and concepts are essential, but true mastery comes from practical experience. "The Complete Hands-On Cybersecurity Analyst Course" exercises are a series of hands-on labs conducted in a virtual environment that you build yourself. These labs simulate real-world scenarios and provide you with the opportunity to apply what you've learned in a controlled, risk-free setting. We will guide you through setting up your own virtual environment that you will use to complete labs, projects, and testing. By setting up your own virtual environment you will gain an understanding of key concepts that are missed in many of the pre-built and browser-based lab environments. Collaborate directly with the course developers and fellow students in a dedicated Discord server. Below are some of the areas in which you will gain practical experience.Threat Detection and AnalysisThreat HuntingCyber Threat IntelligenceLinux BasicsVirtual Lab EnvironmentsPassword CrackingEmail and Phishing AnalysisSIEMs (Splunk, Elastic, Wazuh, etc)Cybersecurity Fundamentals (CompTia Security+ SY0-701 Objectives) Incident responseNetwork monitoring and forensicsVulnerability Scanning, Assessment and ManagementUtilizing advanced tools and techniques for cybersecurity defenseWiFi PentestingHoney PotsReverse EngineeringWriting Malware EmulationsWeb Application PentestingC2 Frameworks Overview Section 1: Virtual Home Lab Networks Lecture 1 Setting Up Home Virtual Lab Intro Lecture 2 Install VirtualBox Lecture 3 VirtualBox Lab Environment Part 1.1: Install pfSense Lecture 4 VirtualBox Lab Environment Part 1.2: Install Kali Linux Lecture 5 VirtualBox Lab Environment Part 1.3: Configure pfSense Lecture 6 VirtualBox Lab Environment Part 2.1: Install Metasploitable 2 Lecture 7 VirtualBox Lab Environment Part 2.2a: Install Windows VM-1 Lecture 8 VirtualBox Lab Environment Part 2.2b: Install Windows VM-2 Lecture 9 VirtualBox Lab Environment Part 2.3a: Configure Windows VM-1 Lecture 10 VirtualBox Lab Environment Part 2.3b: Configure Windows VM-2 Lecture 11 VirtualBox Lab Environment Part 3: Active Directory Lecture 12 VirtualBox Lab Environment Part 4: Setting Up Users, Groups, and Policies Lecture 13 VirtualBox Lab Environment Part 5: Domain Joining Lecture 14 ProxMox Lab Intro and Installation Lecture 15 Proxmox Lab Install Windows VM Lecture 16 Proxmox Lab Install Linux VM Lecture 17 Proxmox Lab Install Windows Server Lecture 18 Proxmox Lab Install pfSense Lecture 19 Proxmox Install SPICE Lecture 20 PROXMOX Lab Install FLARE and Configure Windows VMs Lecture 21 Proxmox Lab Configure Networking Lecture 22 Proxmox Lab Configure Install Active Directory on Domain Controller Lecture 23 Proxmox Lab Configure Users, Groups, and Policies in Active Directory Lecture 24 Proxmox Lab Domain Joining Lecture 25 Proxmox Lab Install pfSense Lecture 26 Proxmox Lab Configure pfSense Firewall Rules Lecture 27 Proxmox Lab Installing Wazuh Server Lecture 28 ProxMox Lab Create and Deploy Wazuh Agents Lecture 29 Proxmox Lab Install Velociraptor Server Lecture 30 ProxMox Cluster Hosts to Expand Your Lab Lecture 31 ReArm Windows Dev VM Section 2: Ultimate Cyber Security Primer Lecture 32 Principal of Duality Lecture 33 Intro to Binary and Machine Code Lecture 34 Linux Primer One - SSH and Basic File Operations Lecture 35 Bandit 0 -> 4 Solutions Lecture 36 Linux Primer Two - More Commands Lecture 37 Bandit 4 -> 7 Solutions Lecture 38 Linux Primer Three - Even More Commands Lecture 39 Bandit 7 -> 10 Solutions Lecture 40 Linux Primer Four - mv, cp, and mkdir Lecture 41 Linux Primer Five - Compression Utilities Lecture 42 Intro to Hex Lecture 43 Intro to Encoding and Base64 Lecture 44 Intro to Cryptography and ROT13 Lecture 45 Linux Primer Six - base64, tr, and xxd Lecture 46 Bandit 10 -> 13 Solutions Lecture 47 Krypton 0 -> 2 Solutions Lecture 48 Linux Primer Seven - File Permissions and the chmod Command Lecture 49 Linux Primer Eight - Intro to SSH Keys Lecture 50 Bandit 13 -> 14 Solution Lecture 51 Intro to Bitwise Operators Lecture 52 Linux Primer Nine - More on grep Lecture 53 Foundations of Networking Lecture 54 Network Pentesting - Intro to NMAP Lecture 55 Linux Primer Ten - nc and ncat Lecture 56 Bandit 14 -> 15 Solution Lecture 57 Bandit 15 -> 16 Solution Lecture 58 Bandit 16 -> 17 Solution Lecture 59 Linux Primer Eleven - diff Lecture 60 Bandit 17 -> 18 Solution Lecture 61 Linux Primer Twelve - More about SSH Lecture 62 Bandit 18 -> 19 Solution Lecture 63 Linux Primer Thirteen - SUID and GUID Binaries Lecture 64 Bandit 19 -> 20 Solution Section 3: Password Cracking Lecture 65 Cryptography - Hashing and MD5 Lecture 66 Password Cracking - Cracking MD5 Hashes Using John Lecture 67 Password Cracking - John Rules Lecture 68 Writing a John Rule Generation Utility - Character Substitution Section 4: Email and Phishing Analysis Lecture 69 Intro to Email Analysis Lecture 70 Email Header Analysis Lecture 71 Email Body Analysis Lecture 72 Email Attachment Analysis Section 5: Introduction to Windows Forensics Lecture 73 Intro to Windows Forensics Lecture 74 Intro to Windows Forensic Artifacts Lecture 75 Windows File System Artifacts Lecture 76 Intro to Windows Registry Lecture 77 Windows Run Keys Lecture 78 Windows Services Keys Lecture 79 Windows Scheduled Tasks Lecture 80 Prefetch Files Lecture 81 Windows User Assist Lecture 82 Windows Recent Documents Lecture 83 Windows Shell Bags Lecture 84 Windows Background Activity Monitor Lecture 85 Windows Shimcache Lecture 86 Intro to Browser Forensics Lecture 87 Google Chrome Forensics Lecture 88 Microsoft Edge Forensics Lecture 89 Mozilla Firefox Forensics Lecture 90 Browsing History View by Nirsoft Lecture 91 Intro to Memory Analysis Lecture 92 Intro to Memory Analysis: Volatility Lecture 93 Intro to Memory Analysis: MemProcFS Lecture 94 Recovering Deleted Files From a NTFS File System (Windows) Lecture 95 Forensic CTF Intro Lecture 96 Forensics CTF Walkthrough Lecture 97 Intro to Velociraptor Lecture 98 Installing Velociraptor Lecture 99 Velociraptor Dashboard Review Lecture 100 Velociraptor Use Case Lecture 101 Build a Velociraptor Off-line Collector Section 6: SIEMs Lecture 102 Install Splunk Lecture 103 Intro to Splunk Lecture 104 Sysmon-Splunk Exercise Lecture 105 Intro to Elastic Lecture 106 Elastic Part 1: Install Elastic Lecture 107 Elastic Part 2: Configure Elastic Lecture 108 Wazuh Part 1: Setup and Detecting Malware Lecture 109 Wazuh Part 2: VirusTotal Integration and Sysmon and PowerShell Logging Lecture 110 Wazuh Part 3: Sysmon Tuning Custom Rules, and APT Simulator Lecture 111 Wazuh CTF Intro Lecture 112 Wazuh CTF Walkthrough Section 7: Bad USB Attacks Lecture 113 Bad USB Attacks Lecture 114 Rubber Ducky Lecture 115 DIY Rubber Ducky: Raspberry Pi Pico Lecture 116 DIY Rubber Ducky: Generic USB Flash Drive Section 8: Incident Response Exercises Lecture 117 Intro to Incident Response Lecture 118 Incident Response Exercises Lab Setup Lecture 119 Incident Response Exercise 1 Lecture 120 Incident Response Exercise 1 Walkthrough Lecture 121 Incident Response Exercise 2 Lecture 122 Incident Response Exercise 2 Walkthrough Lecture 123 Incident Response Exercise 3 Lecture 124 Report Writing Section 9: Honey Pots Lecture 125 Intro to Honey Pots Lecture 126 Installing the Honey Pot (TPOT) on Cloud Server Lecture 127 Reviewing and Analyzing Honey Pot Data (Dionaea) Lecture 128 Reviewing and Analyzing Honey Pot Data (Cowrie) Lecture 129 Reviewing and Analyzing Honey Pot Data (Heralding) Lecture 130 Reviewing and Analyzing Honey Pot Data from CLI Section 10: Threat Hunting Lecture 131 Threat Hunting with Splunk Setup (botsv2) Lecture 132 Threat Hunting with Splunk Part 1: Recon Lecture 133 Threat Hunting with Splunk Part 2: Initial Access Lecture 134 Threat Hunting with Splunk Part 3: Lateral Movement Section 11: Reverse Engineering Lecture 135 Safely Handling Malware Lecture 136 Introduction to Basic Static File Analysis Lecture 137 File Create, Access, and Modify Times Lecture 138 Introduction to File Headers Lecture 139 Solution for Python DETOUR-RE1 Lecture 140 What is the ELF File Type Lecture 141 Solution for Python DETOUR-RE2 Lecture 142 Introduction to Ghidra Lecture 143 Challenge: Ransomware REXOR-RE1 Lecture 144 Solution for REXOR-RE1 Lecture 145 Stripped Binary Analysis Lecture 146 Challenge: Ransomware REXOR-RE2 Lecture 147 Solution for REXOR-RE2 Lecture 148 Challenge: Ransomware REXOR-RE3 Lecture 149 Solution for REXOR-RE3 Lecture 150 What is the Stack and How Does it Work? Lecture 151 Basics of a Buffer Overflow Section 12: Web Application Pentesting Lecture 152 Introduction to the HTTP Protocol Lecture 153 Python Challenged - DETOUR WAPTM-1 Lecture 154 DETOUR WAPTM-1 Solution - Part 1 Lecture 155 DETOUR WAPTM-1 Solution - Part 2 Lecture 156 Web Application Fingerprinting - Viewing Source Code and Robots.txt Lecture 157 DETOUR WAPTM-2 Solution Lecture 158 DETOUR WAPTM-3 Solution Lecture 159 Web Application Fingerprinting - Inspecting Headers and Cookies Lecture 160 Natas 4 -> 6 Solutions Lecture 161 Web Application Testing - Local File Inclusions Lecture 162 Natas 6 -> 9 solutions Lecture 163 Web Application Testing - Command Injection Lecture 164 Natas 9 -> 11 Solutions Lecture 165 Natas 11 -> 12 Solution Lecture 166 Bypassing File Upload Restrictions Lecture 167 Natas 12 -> 14 Solutions Lecture 168 Deep Dive Into Injection - Introduction Lecture 169 Building a LAMP Stack - Part 1 Lecture 170 Building a LAMP Stack - Part 2 Lecture 171 Installing Components of LAMP Stack Lecture 172 Creating Firewall Rule Lecture 173 MySQL Secure Installation Lecture 174 Creating Database Lecture 175 Writing a Landing Page Lecture 176 Writing Lab 1 Lecture 177 Writing Lab 2 Lecture 178 Writing Lab 3 Lecture 179 Writing Lab 4 Lecture 180 Writing Lab 5 Lecture 181 Lab 1 Part 1 Lecture 182 Lab 1 Part 2 Lecture 183 Lab 1 Part 3 Lecture 184 Lab 1 Part 4 Lecture 185 Lab 2 Lecture 186 Lab 3 Part 1 Lecture 187 Lab 3 Part 2 Lecture 188 Lab 4 Part 1 Lecture 189 Lab 4 Part 2 Lecture 190 Lab 5 Part 1 Lecture 191 Lab 5 Part 2 Lecture 192 Writing A Custom Python SQL Injection Tool Lecture 193 Testing SQLi Tool on Lab 2 Lecture 194 Refactoring SQLi Tool Lecture 195 Crafting Payloads for Update Statements Lecture 196 Solution for Natas 14 -> Natas 15 Lecture 197 Refactoring SQL Injection Tool to Implement Basic Authentication and New Payload Lecture 198 Blind Data Exfil Using SQL Injection Timed-Based Attacks Lecture 199 DETOUR WAPTM-4 Challenge Lecture 200 DETOUR WAPTM-4 and Natas 15 -> 16 Solutions Lecture 201 Natas 16 -> 17 Solution Section 13: Vulnerability Scanning Lecture 202 Intro to Vulnerability Scanning Lecture 203 Vulnerability Scanning Mitigation Lecture 204 Vulnerability Scanning Reporting Section 14: C2 Frameworks Lecture 205 Intro to C2 Frameworks Lecture 206 Install and Create a Mythic C2 Framework Payload Lecture 207 Deploy and Task Mythic C2 Agent Lecture 208 PowerShell Empire C2 Framework Lecture 209 Sliver C2 Framework Section 15: Mr. Robot Exercise Lecture 210 Intro to Mr. Robot Exercise Lecture 211 Mr. Robot Exercise Pre-Attack Lecture 212 Mr. Robot Exercise Initial Access Lecture 213 Mr. Robot Exercise C2 Lecture 214 Mr. Robot Exercise C2 Part 2 Lecture 215 Mr. Robot Exercise Intro to Splunk Dashboard Lecture 216 Mr. Robot Exercise C2 Blue Team Lecture 217 Mr. Robot Exercise Wireless Attacks Lecture 218 Mr. Robot Exercise Bad USB Lecture 219 Mr Robot Exercise Data Destruction (Part 1) Lecture 220 Mr. Robot Exercise Data Destruction (Part 2) Lecture 221 Mr. Robot Exercise Applying MITRE ATT&CK Assignment Intro Lecture 222 Mr Robot Exercise Applying MITRE ATT&CK Assignment Walkthrough Lecture 223 Mr. Robot Exercise Incident Response Report Writing Walkthrough Lecture 224 Mr. Robot Exercise Ransomware Analysis Challenge Intro Lecture 225 Mr. Robot Exercise Ransomware Analysis Walkthrough Section 16: WiFi Pentesting Lecture 226 WiFi Basics Lecture 227 Intro to WiFi Pentesting Lecture 228 Setting up WiFi Network Card in Kali Lecture 229 WiFi Pentesting: Scanning Lecture 230 WiFi Pentesting: Exploiting WPA/WPA2 Lecture 231 WiFi Pentesting MitM Attack (ARP Poisoning) Lecture 232 WiFi Pentesting: Manual MAC Address Spoofing Lecture 233 WiFi Pentesting MitM Attack (DNS Spoofing) Lecture 234 Evil Portal Attack Lecture 235 WPA3 Pentesting Section 17: Cyber Threat Intelligence Lecture 236 Intro to CTI Lecture 237 Lockheed Martin Cyber Kill Chain Lecture 238 Pyramid of Pain Lecture 239 Intro to MITRE ATT&CK Lecture 240 ATT&CK Navigator Lecture 241 Intro to Unified Kill Chain Lecture 242 Crown Jewel Analysis Lecture 243 Primary Intelligence Requirements Lecture 244 Collection Plan Lecture 245 Operationalizing Crown Jewel Analysis, PIR Development, and the Collection Plan Section 18: Security Fundamentals (CompTIA Security+ Objectives) Lecture 246 Intro to Security Fundamentals (Sec+ Objectives) Lecture 247 Security Controls (CompTIA Sec+ OBJ 1.1) Lecture 248 Fundamental Security Concepts (CompTIA Sec+ OBJ 1.2) Lecture 249 Change Management (Comptia Sec+ OBJ 1.3) Lecture 250 Cryptography (CompTIA Sec+ OBJ 1.4) Lecture 251 Hashing vs Encryption Lecture 252 Digital Signatures Lecture 253 Threat Actors , Vectors, and Attack Surfaces (CompTIA Sec+ (OBJ 2.1 and 2.2) Lecture 254 Vulnerabilities (CompTIA Sec+ OBJ 2.3) Lecture 255 Malicious Activity Part 1 (CompTIA Sec+ OBJ 2.4) Lecture 256 Malicious Activity Part 2 (CompTIA Sec+ OBJ 2.4) Lecture 257 Mitigation Techniques Part 1 (CompTIA Sec+ OBJ 2.5) Lecture 258 Mitigation Techniques Part 2 (Comptia Sec+ OBJ2.5) Lecture 259 Architecture Considerations Part 1 (CompTIA Sec+ OBJ 3.1) Lecture 260 Architecture Considerations Part 2 (CompTIA Sec+ OBJ 3.1) Lecture 261 Application of Security Principles (CompTIA Sec+ OBJ3.2) Lecture 262 Strategies to Protect Data (CompTIA Sec+ OBJ3.3) Lecture 263 Resilience and Recovery (CompTIA Sec+ OBJ3.4) Lecture 264 Apply Common Security Techniques (Sec+ OBJ4.1) Lecture 265 Asset Management (Sec+ OBJ4.2) Lecture 266 Vulnerability Management (Sec+ OBJ4.3) Lecture 267 Alerting and Monitoring (Sec+ OBJ4.4) Lecture 268 Enhancing Security (Sec+ OBJ4.5 Lecture 269 Identity and Access Management (Sec+ OBJ4.6) Lecture 270 Automation and Orchestration (Sec+ OBJ4.7) Lecture 271 Incident Response (Sec+ OBJ4.8) Lecture 272 Data Sources (Sec+ OBJ4.9) Lecture 273 Effective Security Governance (Sec+ OBJ5.1) Lecture 274 Risk Management (Sec+ OBJ5.2) Lecture 275 3d Party Risk Assessment & Management (Sec+ OBJ5.3) Lecture 276 Effective Security Compliance (Sec+ OBJ5.4) Lecture 277 Audits and Assessments (Sec+ OBJ 5.5) Lecture 278 Security Awareness Practices (Sec+ OBJ 5.6) Section 19: Network Traffic Analysis Lecture 279 Introduction to Network Traffic Analysis Lecture 280 Introduction to TCPdump Lecture 281 Analyzing Network Traffic with TCPdump Lecture 282 Wireshark Part 1: Introduction to Wireshark Lecture 283 Wireshark Part 2: Configuring Profiles and Filters Lecture 284 Wireshark Part 3: Analyzing Network Traffic Lecture 285 Snort on pfSense Lecture 286 Snort on pfSense Custom Rules Lecture 287 Snort on pfSense Pre-Built Rules Aspiring, beginner, and intermediate cybersecurity analysts. Anybody with a desire to learn more about cybersecurity. Homepage Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content.
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now