5G Cyber Security
About Course
Introduction to 5G cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security 5G
- Cyber-attack chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objective
Virtualization on VirtualBox
- Kali Linux
- Install, deploy and run Kali Linux
- Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
- Nmap scanning
Search engine scanners
Internet scanners
- Google search engine
Open-source intelligence
- Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
- Basic commands and usage
- Module exploration
- Search for vulnerabilities from scanning results
- Exploitation of systems
- Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering
- Dark Web with Tor
- Hacking groups and forums
- Wireless security assessment with WiFi PineApple
- Wireless vulnerabilities
- Social Engineering Toolkit (SET) attacks
- Direct attacks into Windows 10 with Macros and Powershell
Web, application, and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
- Injection
- Broken authentication
- Sensitive data exposure
- XML External Entities
- Broken access control
- Security misconfiguration
- Cross-Site Scripting
- Insecure Deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
- Payloads package on injection
- Fully undetected payloads
- Buffer overflow for shell
Come join thousands of students who have learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!
Course Content
Security Course lectures
-
5G Security: A Shared Responsibility
05:15 -
R&S Thirty-Five: 5G security aspects
36:27 -
CISA Webinar: 5G Security and Vulnerabilities
56:18 -
4G to 5G Evolution: In-Depth Security Perspective
46:46 -
Webinar: 5G Security Briefing
01:04:49 -
yes, your phone is already hacked
06:19 -
5G Security Evolution | Vadim Paryev | Swisscom
01:04:45 -
New Vulnerabilities in 5G Networks
43:36