Course Highlights
  • Understand the basic concepts and terminologies used in the information and cyber security fields
  • Take up entry roles for IT and Cybersecurity Positions
  • Differentiate between the various forms of malware and how they affect computers and networks
  • Understand how hackers actually hack
Curriculum

4 Topics
Welcome to the Course
Who Am I? Meet your Instructor
Connect with Me
Download the Guide Book

7 Topics
Difference Between Information Security and Cyber Security
The Trinity of IT Security - CIA
Basic Terminologies
Computer Protocols
Cookies
The TCP/IP
Section Quiz

8 Topics
Section Intro
This is NOT Hacking
Types of Hackers
The Hacking Methodology
The WhoIS Query
Social Engineering Tactics - Part 1
Social Engineering Tactics - Part 2
Section Quiz

11 Topics
Intro to the Section
Brute Force Attacks
Phishing
Phishing - Part 2
Bots and Botnets
DoS and DDoS
Pings
Man in the Middle Attacks
SQL Injections
Supply Chain Attacks
Section Quiz

7 Topics
Introduction to Malware
Viruses & Worms
Trojans
Adware and Spyware
Ransomware
Other Types of Malware
Section Quiz

10 Topics
Section Intro
Firewalls
Encryption
Biometrics
Anti Virus
Factor Authentication Methods
Honey Pots and DMZs
Security for Wireless Networks
Password Management
Section Quiz

6 Topics
Section Intro
Cyber Security Policies
BYOD Management
A Sample BYOD Policy
The Security vs Ease of Access Paradox
Review Update

3 Topics
Introduction to Cyber Warfare
The Colonial Pipeline Attack
The Sony Hack

5 Topics
Actionable Steps for Personal Security
SPECIAL LESSON - How to Launch your Career in Cyber Security
Getting your Certificate
Conclusion
Course Promo

  Write a Review

The Absolute Beginners Guide to Cyber Security 2024 - Part 1

Go to Paid Course