![]() |
The Absolute Beginners Guide To Cyber Security 2024 - Part 1
![]() The Absolute Beginners Guide To Cyber Security 2024 - Part 1 Last updated 2/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 4.07 GB | Duration: 4h 53m Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more What you'll learn Understand the basic concepts and terminologies used in the information and cyber security fields Take up entry roles for IT and Cybersecurity Positions Differentiate between the various forms of malware and how they affect computers and networks Understand how hackers actually hack Requirements You should know how to use a computer You should know how to use the internet Description ** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **** UPDATED DECEMBER 2023 WITH NEW LESSON ON RANSOMWARE **Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.' - E. Wolfe"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris LoyolaPERFECT FOR COMPLETE BEGINNERSThis course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. Course CurriculumIn the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as PhishingBrute Force AttackDoS & DDoS AttacksBots and Botnetsand much moreWe will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following workAntivirusFirewallsEncryptionBiometricsAuthenti cation Methodsand much moreFinally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. What are you waiting for??? Enroll in this best selling course today.Alex. Overview Section 1: Welcome to the Course Lecture 1 Welcome to the Course Lecture 2 Who Am I? Meet your Instructor Lecture 3 Connect with Me Lecture 4 Download the Guide Book Section 2: General Introduction to IT & Cyber Security Lecture 5 Difference Between Information Security and Cyber Security Lecture 6 The Trinity of IT Security - CIA Lecture 7 Basic Terminologies Lecture 8 Computer Protocols Lecture 9 Cookies Lecture 10 The TCP/IP Section 3: Hackers - Who are They? Lecture 11 Section Intro Lecture 12 This is NOT Hacking Lecture 13 Types of Hackers Lecture 14 The Hacking Methodology Lecture 15 The WhoIS Query Lecture 16 Social Engineering Tactics - Part 1 Lecture 17 Social Engineering Tactics - Part 2 Section 4: Attacks Lecture 18 Intro to the Section Lecture 19 Brute Force Attacks Lecture 20 Phishing Lecture 21 Phishing - Part 2 Lecture 22 Bots and Botnets Lecture 23 DoS and DDoS Lecture 24 Pings Lecture 25 Man in the Middle Attacks Lecture 26 SQL Injections Lecture 27 Supply Chain Attacks Section 5: Malware Lecture 28 Introduction to Malware Lecture 29 Viruses & Worms Lecture 30 Trojans Lecture 31 Adware and Spyware Lecture 32 Ransomware Lecture 33 Other Types of Malware Section 6: Defences Lecture 34 Section Intro Lecture 35 Firewalls Lecture 36 Encryption Lecture 37 Biometrics Lecture 38 Anti Virus Lecture 39 Factor Authentication Methods Lecture 40 Honey Pots and DMZs Lecture 41 Security for Wireless Networks Lecture 42 Password Management Section 7: Cyber Security at the Work Place Lecture 43 Section Intro Lecture 44 Cyber Security Policies Lecture 45 BYOD Management Lecture 46 A Sample BYOD Policy Lecture 47 The Security vs Ease of Access Paradox Lecture 48 Review Update Section 8: Cyber Warfare and Cyber Attacks Against Companies Lecture 49 Introduction to Cyber Warfare Lecture 50 The Colonial Pipeline Attack Lecture 51 The Sony Hack Section 9: Extras and Conclusion Lecture 52 Actionable Steps for Personal Security Lecture 53 SPECIAL LESSON - How to Launch your Career in Cyber Security Lecture 54 Getting your Certificate Lecture 55 Conclusion Lecture 56 Course Promo Students who want to learn the basics of computer and cyber security,Students who want to become IT or Cyber Security Experts Screenshot Цитата:
|
Часовой пояс GMT +3, время: 14:07. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot