5G Cyber Security

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Introduction to 5G cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.

Introduction to cyber-security 5G

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective

Virtualization on VirtualBox

  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing

Reconnaissance

Information gathering

Assess security vulnerabilities

Scanning engines

  • Nmap scanning

Search engine scanners

Internet scanners

  • Google search engine

Open-source intelligence

  • Recon-ng scanning

Security standards

Center for Internet Security (CIS)

Hardening checks for systems

Exploitation

Metasploit framework for ethical hacking

  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning

Security hardening and configuration

Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell

Web, application, and database vulnerabilities

Open Web Application Security Project (OWASP) top 10

  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring

Full SQLMAP tutorial for web penetration testing

BurpSuite tutorial for manual injection on web penetration testing

Payload testing with custom load

Creation of payload

  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell

Come join thousands of students who have learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!

Show More

Course Content

Security Course lectures

  • 5G Security: A Shared Responsibility
    05:15
  • R&S Thirty-Five: 5G security aspects
    36:27
  • CISA Webinar: 5G Security and Vulnerabilities
    56:18
  • 4G to 5G Evolution: In-Depth Security Perspective
    46:46
  • Webinar: 5G Security Briefing
    01:04:49
  • yes, your phone is already hacked
    06:19
  • 5G Security Evolution | Vadim Paryev | Swisscom
    01:04:45
  • New Vulnerabilities in 5G Networks
    43:36

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?