Ultimate Cybersecurity Analyst
No Student Left Behind - Enjoy FREE
This course is designed for anyone who is willing to start their career in cybersecurity. We will go through a different daily process and technique that information security analysis uses in the workplace. We will practice different tools and techniques in real time. Fawad Bacha will also give live presentations that will include real-life example and how to use these skills at work place to secure their environment. <> یہ کورس ہر اس شخص کے لیے ڈیزائن کیا گیا ہے جو سائبر سیکیورٹی میں اپنا کیریئر شروع کرنے کے لیے تیار ہے۔ ہم ایک مختلف روزمرہ کے عمل اور تکنیک سے گزریں گے جسے معلومات کی حفاظت کا تجزیہ کام کی جگہ پر استعمال کرتا ہے۔ ہم حقیقی وقت میں مختلف ٹولز اور تکنیکوں کی مشق کریں گے۔ فواد باچا لائیو پریزنٹیشنز بھی دیں گے جن میں حقیقی زندگی کی مثالیں شامل ہوں گی اور کام کی جگہ پر ان صلاحیتوں کو اپنے ماحول کو محفوظ بنانے کے لیے کس طرح استعمال کرنا ہے۔
A message from Fawad Bacha
How to use this course
How to Access Class Discussion Board
Fawad Bacha Personal Experience and Background
Live class Schedule
Week 1 Instruction & Direction
Week 1 Outline In English
Week 1 Outline In Urdu
Week 1 - Lecture Part 1
Week 1 - Lecture Part 2
Week 1 - Lecture Part 3
LAB: WIT1A - MEO File Encryption Software Downloading and Installations
LAB: WIT1B - How to Encrypt and Decrypt files two options
LAB: WIT2 - Wireless Network Watcher
Bonus LAB: WIT2A - Wireshark Network Analyzer
LAB: WIT3 - VPN – Free hotspotshield installation
LAB: WIT4 – Creating Protonmail
Live Zoom Class with Fawad Bacha
Hacks Plaining Extra Points - Pick a Vulnerability to Learn About
RECORDED - Live Zoom Class with Fawad Bacha - Jan-29-2023
Bonus Lecture - What is C.I.A Triad - Confidentiality, integrity and availability
Week 2 Instruction & Direction
Week 2 Outline
Week 2 - Lecture
LAB: W2T1 – Using Social-Engineering Toolkit (SET) in Kali - Creating Phishing Email
Reading: Social Engineering Motivation Facts
LAB: W2T2 - Using Disposable Email Services (Privacy and Scam Protection) on Desktop
LAB: W2T3A - Installing Orbot-Proxy with Tor App on Android
RECORDED - Live Zoom Class with Fawad Bacha - Feb-02-2023
BONUS Lecture- Types of Attackers - Anonymous - from CISSP Course
BONUS Lecture- Types of Attackers - Hackers - from CISSP Course
Week 3 Instruction & Direction
Week 3 Outline
Week 3 Lecture
W3T1 - Practicing OnionShare - Skipped to Week 5
LAB W3T2 – Creating Bootable USB with Tails OS - Surveillance OS
W3T2A - Working with Tails OS (from Bootable USB)
LAB - Run Tails in a virtual machine
LAB: W3T3 - Creating a Bootable USB
LAB: W3T4 – Accessing Dark Web with TOR Browser
Bonus - Crypto Currency - NFTs - Web3
RECORDED - Live Zoom Class with Fawad Bacha - Feb-12-2023
Week 4 Outline
Week 3 Instruction & Direction
Week 4 Lecture
LAB: W4T1 - Analyzing Malicious URL Using Multiple Tools
LAB: W4T2 - Reverse Image Search
LAB: W4T3 - Using WEBrate (ping-traceroute- geolocation-WHOIS)
LAB: W4T4 - Search your email on publicly available Data Breaches
RECORDED - Live Zoom Class with Fawad Bacha - Feb-19-2023
List of Great Software To Know for Organization
Week 5 Outline
Week 5 Lecture
LAB: W5T1 - Practicing Image Steganography Hiding Secret Image and Message
LAB: W5T2A - Using Onion share to securely send secret files
LAB: W5T2B - Using Onion share – Chat Anonymously and Hosting Dark Web Site
LAB: W5T3 – Bonus – Installing Tails OS on Virtual Machine
RECORDED - Live Zoom Class with Fawad Bacha - Feb-26-2023