Learn Cybersecurity

Table Of Contents

  • What is cybersecurity?

  • Common Terminologies

  1. Hacking

  2. Hackers

  3. Vulnerability

  4. Exploits

  5. Insider Threats

  • Types of Hacking

  • Types of Exploits

  • Phases of Hacking

  • Job Opportunities

  • Types Of Networks

  1. PAN

  2. LAN

  3. WAN

  4. Wired Network

  5. Wireless Network

  • Computer Networks

  1. OSI Model

  2. TCP/IP Reference Model

  • Naming Address and Forwarding

  1. MAC Address

  2. IP Address

  3. Subnet Mask

  4. Gateway

  5. Network Address Translation

  6. Domain Name Server

  • Subnetting

  • Networking Devices

  1. Hubs

  2. Bridges

  3. Switches

  4. Routers

  5. Firewalls

  6. WAPs

  7. Modem

  • Protocols

  1. Application Layer

  2. Transport Layer

  3. Internet Layer

  4. Link Layer

  5. Other Protocols

  • Objectives Of Cryptography

  • Types Of Attacks

  1. Passive Attacks

  2. Active Attacks

  • Cryptosystems

  1. Encryption Schemes

  2. Key Terminologies

  3. Convections Used In Encryption

  4. Cost Benefit Analysis

  5. Symmetric Encryption Scheme

  6. "Asymmetric Encryption (Public Key Cryptography)"

  7. Public Key Infrastructure

  • Hashing

  • Cryptographic Protocols

  1. Secure Socket Layer (SSL)

  2. Pretty Good Privacy (PGP)