Skip to content

SNGWN/CEH-Notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

YouTube Playlist

--> Playlist content will keep on updating and it contains or will contain topics related to 
  1. Cryptography --> Done
  2. Lab Setup + Network and OS Fundamentals --> Done
  3. System Security --> Basics Done --> Higher level topics will be added with Labs
  4. Network Security --> To Be Released
  5. Web Application Security --> To Be Released
  6. Android Application Security --> To Be Released
  7. Cloud Fundamentals --> To Be Released
  8. Cloud Security --> To Be Released
๐Ÿ“บ Fundamentals
Understanding CIA Triad (Confidentiality, Integrity, Availability) Common Security Standards
!Understanding CIA Triad (Confidentiality, Integrity, Availability)](https://youtu.be/J-c3SydXA4A?si=_NCr9wewAgnTi11V) Common Security Standards
Different Teams Types of Testing
Different Teams Types of Testing
Five Phase of Hacking Common Terms
Five Phase of Hacking Common Terms
๐Ÿ“บ Cryptography
๐ŸŽฅ Encoding - Decoding ๐ŸŽฅ Encrypption - Decryption
Encoding - Decoding Encrypption - Decryption
๐ŸŽฅ Video 3 ๐ŸŽฅ Digital Signatures and Certificates
Hashing Digital Signatures and Certificates
๐Ÿ“บ Lab Setup + Network and OS Fundamentals
Windows Installation in VMWare Pro Kali Linux Installation in VMWare Pro
Windows Installation in VMWare Pro Kali Linux Installation in VMWare Pro
Linux Introduction Part 1 Linux Introduction Part 2
Linux Introduction Part 1 Linux Introduction Part 2
Introduction to Network and Topology Intra Network Packet Transmission
Introduction to Network and Topology Intra Network Packet Transmission
Inter Network Packet Transmission IP Address Structure and there Classification
Inter Network Packet Transmission IP Address Structure and there Classification
Public and Private IP Allocation Subnatting & Supernatting
Public and Private IP Allocation Subnatting & Supernatting
๐Ÿ“บ Basic Malware and System Exploitation Techniques
Windows Lock Screen Bypass Malware Part 1
Windows Lock Screen Bypass Malware Part 1
Malware Part 2 Malware Part 3
Malware Part 2 Malware Part 3
Malware Part 4 Network Connection and Traffic
Malware Part 4 Network Connection and Traffic
Memory Stack Introduction Part 1 Memory Stack Introduction Part 2
Memory Stack Introduction Part 1 Memory Stack Introduction Part 2
Memory Corruption and Buffer Overflow Eternal Blue or MS-17-010 or CVE-2017-0144
Memory Corruption and Buffer Overflow Eternal Blue or MS-17-010 or CVE-2017-0144