Sunny Dimalu The Cyborg
Learn the fundamentals of cybersecurity with this hands-on course for beginners! In this 2025 edition, you'll gain practical skills in ethical hacking, Cyber security, network security, and threat detection through real-world exercises. Perfect for anyone looking to start a career in cybersecurity! Here’s what you’ll learn: Phase 1: Linux administration and basic commands. Phase 2: Mastering PowerShell, a must-have skill in cybersecurity. Phase 3: Understanding computer networking, the backbone of cybersecurity, explained with clear animations. Phase 4: Network hacking, network security, and system security. This course is structured in a simple, logical order to help you learn without feeling overwhelmed. No prior experience? No problem! By the end, you’ll have the skills to start your cybersecurity journey confidently. Course Link: https://www.udemy.com/course/hands-on-cyber-security-and-ethical-hacking-from-0/?referralCode=215B6E0F86B92F10EDA4 Disclaimer - This video is made available for educational and informational purposes only. All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. Sunny dimalu the cyborg is not responsible for any misuse of the provided information. Join this channel to get access to perks: https://www.youtube.com/channel/UC0jvF7_96zBs2DycRFqxxcA/join Timestamps : 0:00 Introduction 3:10 Intro to Kali Linux 4:05 essential commands 7:46 ls command 13:13 cd command 16:01 nano command 20:57 cat command 29:39 Create Directories 31:53 Grep command 37:36 Wc command 39:57 Output redirection 46:27 Piping 53:04 Copy files 59:33 Remove files 1:07:23 Intro to Users & it’s types 1:14:27 Root user 1:15:48 Sudo command – Peform admin tasks 1:25:58 Ip addr command 1:30:14 Install apps/packages 1:33:19 remove apps/packages 1:36:40 Intro to Powershell 1:39:59 Install powershell7 1:44:35 Powershell command structure 1:50:13 essential commands 1:52:49 Powershell aliases 1:56:37 Get-ChildItem(ls) command 2:03:28 Set-location(cd) – change directories 2:08:15 get-help 2:13:10 create files & Append content 2:20:11 View file contents 2:24:32 Select-string – search through files 2:29:59 Copy files 2:38:40 Remove files 2:45:45 Rename & move files 2:50:35 Get-process- list processes. 2:56:31 Start & Stop processes 3:00:41 list and services 3:08:05 Output Redirection 3:16:12 Piping 3:24:38 Measure-Object 3:32:40 intro to Objects 3:37:55 Objects hands-on 3:49:01 Format and customize output 3:55:23 Where-object : advanced filtering 4:05:14 More on objects 4:11:07 Where-objects : Combine multiple conditions 4:14:46 Network command – Get-NetIpconfig command 4:21:22 Network command – Get-Netadaper 4:27:47 Test-NetConnection command 4:33:55 Intro to Computer Network 4:39:30 What is a Packet 4:46:01 host 4:47:04 What is a servers & types 4:51:01 What is an ethernet cable 4:53:42 What is Mac address 4:59:07 hub explained 5:04:16 switch explained 5:10:26 Router explained 5:16:17 Modem explained 5:22:13 Wireless Access Point 5:28:11 Intro to OSI Model 5:31:53 Application layer 5:36:27 Presentation layer 5:41:45 Session Layer 5:47:14 Transport layer 6:04:39 Network Layer 6:13:53 Data Link Layer 6:25:48 Physical layer 6:29:00 Intro to Cryptography 6:33:07 basic terms 6:35:31 Symmetric encryption 6:44:12 Asymmetric encryption 6:50:59 intro to hashing 6:54:08 how hashing works 7:04:34 Ping Command 7:09:03 Intro to number system & types 7:14:55 hexadecimal 7:18:22 Binary to decimal conversion 7:23:42 decimal to binary conversion 7:30:13 logical operators 7:35:14 Nmap 7:42:49 Wireshark crash course 8:17:13 Wifi hacking – System requirements & intro to Aircrack-ng 8:24:01 Managed and monitor mode 8:26:02 enabled monitor mode properly 8:31:05 Detect Wifi neetworks & capture traffic 8:41:10 Scan and discover 5GH networks 8:48:16 What is a 4way handshake 8:52:44 Capture 4way handshake 9:00:16 Intro to De-authentication attack 9:03:37 peform de-authentication attack 9:14:28 Intro to Wordlists,bruteforce & dictionary attack 9:18:21 Crack wifi pasword 9:26:06 Detect De-authentication attack(Protect Wifi)
Complete understanding of the topic
Hands-on practical knowledge
Real-world examples and use cases
Industry best practices
Take your learning to the next level with premium features