Mr Robot TV Show In Real Life - Cyber Security
- Description
- Curriculum
- FAQ
- Reviews
:::::::::::::::::::::::| Warning |::::::::::::::::::::::: :
This is For Educational Purposes Only :
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Hello Friend, Hello Friend if you want to become The top 1% of the top 1%, take this course you will learn Ethical Hacking Step by step by practice
and use it in real life to defend your self from such attacks also it is fun this way believe me you will learn much faster.
“Mr. Robot” follows Elliot (Rami Malek), a young Hacker who works as a cyber-security engineer by day and a vigilante hacker by night.
To be honest I am a big fan of this Show and What makes it unique is that the Hacking Scenes are some how realistic not like other hacking Movies.
so here in this course we will Learn and Apply every hacking happened and we will learn all the Technologies and Tools needed for this as well as the ability to simulate the hacks and build the environment that happened in this Show. (of course as an ethical Hackers)
In this course we will handle these scenes (from seasons 1 + 2 + 3 + 4):
-
Ron’s Coffee Scene
-
DDOS Attack Scene
-
Social Engineering
-
Building Hacking Raspberry PI
-
Hacking HVAC Systems
-
Infected E Corp servers crash on boot-up (Rootkit)
-
The USB + Bluetooth Hack
-
How Elliot Hacked the FBI Cellphones
-
…
In this Course we will learn:
-
What is TOR and how it works
-
Make a TOR website
-
How To Detect TOR Websites
-
MITM Attack
-
ARP and ARP poisoning
-
Sniffing packets using WireShark DDOS Attack
-
What is Botnet
-
How to protect yourself from such attacks
-
Learn Linux for Cyber Security
-
Learn Cyber Security in a FUN Way
-
…
-
3Linux Section OutlineText lesson
-
4Introduction LecturesText lesson
-
5History of UnixText lesson
-
6linux vs UnixVideo lesson
-
7Then What is GNU LinuxText lesson
-
8What is Linux DistributionsText lesson
-
9Unix ArchitectureVideo lesson
-
10Linux Fundamentals LecturesText lesson
-
11IMPORTANT NOTEText lesson
-
12Linux Directory Structure TheoryText lesson
-
13The Shell TheoryText lesson
-
14Basic Linux Commands TheoryText lesson
-
15Linux Basics Commands Hands-OnVideo lesson
-
16Working with Directories TheoryText lesson
-
17Working with Directories Hands-OnVideo lesson
-
18Listing Files and Understanding ls Output TheoryText lesson
-
19Listing Files and Understanding ls Output Hands-OnVideo lesson
-
20Links and Shortcuts in Linux TheoryText lesson
-
21Links and Shortcuts in Linux Honds-OnVideo lesson
-
22File and Directory Permissions TheoryText lesson
-
23File and Directory Permissions Hands-OnVideo lesson
-
24Finding Files and Directories Hands-OnVideo lesson
-
25Viewing Files and the Nano Editor TheoryText lesson
-
26Viewing Files and the Nano Editor Hands-OnVideo lesson
-
27Editing Files in Vi/Vim TheoryText lesson
-
28Editing Files in Vi/Vim Hands-OnVideo lesson
-
29Linux copy move commands Hands-OnVideo lesson
-
30Intermediate Linux SkillsText lesson
-
31Input Output and Redirection TheoryText lesson
-
32Linux Redirection Hands-OnVideo lesson
-
33Linux Comparing Files Hands-OnVideo lesson
-
34Linux Transfer Files Over NetworkVideo lesson
-
35Shell Aliases TheoryText lesson
-
36Shell Aliases Hands-OnVideo lesson
-
37Linux Environment Variable Hands-OnVideo lesson
-
38Processes and Job Control TheoryText lesson
-
39Processes and Job Control Hands-OnVideo lesson
-
40Scheduling Repeated Jobs with Cron TheoryText lesson
-
41Scheduling Repeated Jobs with Cron Hands-OnVideo lesson
-
42Linux History Hands-OnVideo lesson
-
43Linux Sudo Another Users Hands-OnVideo lesson
-
44Linux Users Management Hands-OnVideo lesson
-
45The Linux Boot ProcessText lesson
-
46What is Shell ScriptingText lesson
-
47Linux Var SpecialVideo lesson
-
48Linux OperatorsVideo lesson
-
49Linux if else CaseVideo lesson
-
50Linux LoopsVideo lesson
-
51Linux FunctionsVideo lesson
-
52Rons Coffee Scene BriefVideo lesson
-
53Deep Web Vs Dark WebVideo lesson
-
54TOR (The Onion Routing)Video lesson
-
55MITM Attack (man-in-the-middle)Video lesson
-
56Packet Sniffing - TheoryVideo lesson
-
57Understanding The Rons Coffee Network InfrastructureVideo lesson
-
58Building the Environment: Building The TOR ServerVideo lesson
-
59Building the Environment: Building The Elliot (Hacker) MachineVideo lesson
-
60Ron's Coffee Scene In Real Life !!!Video lesson
-
61DDoS Attack Scene BriefVideo lesson
-
62What is DDoSVideo lesson
-
63How DDoS Attack WorksVideo lesson
-
64How To Identify DDoS AttackVideo lesson
-
65DDoS BotnetVideo lesson
-
66HTTP Flood AttackVideo lesson
-
67SYN Flood AttackVideo lesson
-
68DNS Amplification AttackVideo lesson
-
69Ping ICMP Flood AttackVideo lesson
-
70Low and Slow AttackVideo lesson
-
71DDoS Attack ToolsVideo lesson
-
72Famous DDoS AttacksVideo lesson
External Links May Contain Affiliate Links read more