-
Module 1 3
Introduction
-
Lecture1.130 min
-
Lecture1.205 min
-
Lecture1.305 min
-
-
Module 2 18
Fundamental Elements of Cybersecurity
-
Lecture2.105 min
-
Lecture2.205 min
-
Lecture2.305 min
-
Lecture2.405 min
-
Lecture2.505 min
-
Lecture2.605 min
-
Lecture2.705 min
-
Lecture2.805 min
-
Lecture2.905 min
-
Lecture2.1005 min
-
Lecture2.1105 min
-
Lecture2.1205 min
-
Lecture2.1305 min
-
Lecture2.1405 min
-
Lecture2.1505 min
-
Lecture2.1605 min
-
Lecture2.1705 min
-
Lecture2.1805 min
-
-
Module 3 13
Introduction to Cyber Threats
-
Lecture3.105 min
-
Lecture3.205 min
-
Lecture3.305 min
-
Lecture3.405 min
-
Lecture3.505 min
-
Lecture3.605 min
-
Lecture3.705 min
-
Lecture3.805 min
-
Lecture3.905 min
-
Lecture3.1005 min
-
Lecture3.1105 min
-
Lecture3.1205 min
-
Lecture3.1305 min
-
-
Module 4 12
Security Risk Analysis and Management
-
Lecture4.105 min
-
Lecture4.205 min
-
Lecture4.305 min
-
Lecture4.405 min
-
Lecture4.505 min
-
Lecture4.605 min
-
Lecture4.705 min
-
Lecture4.805 min
-
Lecture4.905 min
-
Lecture4.1005 min
-
Lecture4.1105 min
-
Lecture4.1205 min
-
-
Module 5 3
Cybersecurity Laws
-
Lecture5.105 min
-
Lecture5.205 min
-
Lecture5.305 min
-
-
Module 6 1
Conclusion
-
Lecture6.105 min
-
-
Exam 1
-
Quiz7.130 questionsFinal
-
Man in the Middle (MITM)
Man in the Middle (MITM) is a rather new type of cyber threat where a cyber perpetrator portrays himself in a digital conversation as if he is a part of normal two-way communication. To understand it better, consider a scenario where you are conversing with your friend and someone perpetrate in a way where you assume the perpetrator’s message as if it has been sent by your friend. Such a type of cyber-attack is known as Man in the Middle (MITM) attack. The prime purpose is to either impersonate one of the parties or to steal information, such as credit card numbers or login credentials. This is the reason that SaaS business and e-commerce sites are their prime attack. Moreover, it can also be used to get inclusion into the secured perimeter during the infiltration stage of an APT assault. Some of the most common types include IP spoofing, ARP spoofing, and DNS spoofing. While, HTTPS spoofing, SSL BEAST, SSL stripping, and SSL hijacking are some of the other types of MITM attacks.