image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **
** UPDATED DECEMBER 2023 WITH NEW LESSON ON RANSOMWARE **
Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.
This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.
Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.
'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.'  
- E. Wolfe
"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." 
- Chris Loyola
PERFECT FOR COMPLETE BEGINNERS
This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. 
Course Curriculum
In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and 
computer protocols
.
In section 2, we will explore the world of hackers and the
hacking methodology
. We will take a look at the different types of hackers and how they actually hack.
Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as 
Phishing
Brute Force Attack
DoS & DDoS Attacks
Bots and Botnets
and much more
We will then move on to cover everything about
malware
. You will learn the various forms of malware such as
viruses, worms
and
trojans
and how they differ from one another.
In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work
Antivirus
Firewalls
Encryption
Biometrics
Authentication Methods
and much more
Finally we will cover and discuss about other topics related to both information and cyber security such as the
BYOD policy
and
cyber warfare.
By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. 
What are you waiting for??? Enroll in this best selling course today.
Alex.
Who this course is for:
Students who want to learn the basics of computer and cyber security
Students who want to become IT or Cyber Security Experts

What you'll learn

Understand the basic concepts and terminologies used in the information and cyber security fields

Take up entry roles for IT and Cybersecurity Positions

Differentiate between the various forms of malware and how they affect computers and networks

Understand how hackers actually hack

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Welcome to the Course
4
1.1-Welcome to the Course
1.2-Who Am I? Meet your Instructor
1.3-Connect with Me
1.4-Download the Guide Book
2-General Introduction to IT & Cyber Security
7
2.1-Difference Between Information Security and Cyber Security
2.2-The Trinity of IT Security - CIA
2.3-Basic Terminologies
2.4-Computer Protocols
2.5-Cookies
2.6-The TCP/IP
2.7-Section Quiz
3-Hackers - Who are They?
8
3.1-Section Intro
3.2-This is NOT Hacking
3.3-Types of Hackers
3.4-The Hacking Methodology
3.5-The WhoIS Query
3.6-Social Engineering Tactics - Part 1
3.7-Social Engineering Tactics - Part 2
3.8-Section Quiz
4-Attacks
11
4.1-Intro to the Section
4.2-Brute Force Attacks
4.3-Phishing
4.4-Phishing - Part 2
4.5-Bots and Botnets
4.6-DoS and DDoS
4.7-Pings
4.8-Man in the Middle Attacks
4.9-SQL Injections
4.10-Supply Chain Attacks
4.11-Section Quiz
5-Malware
7
5.1-Introduction to Malware
5.2-Viruses & Worms
5.3-Trojans
5.4-Adware and Spyware
5.5-Ransomware
5.6-Other Types of Malware
5.7-Section Quiz
6-Defences
10
6.1-Section Intro
6.2-Firewalls
6.3-Encryption
6.4-Biometrics
6.5-Anti Virus
6.6-Factor Authentication Methods
6.7-Honey Pots and DMZs
6.8-Security for Wireless Networks
6.9-Password Management
6.10-Section Quiz
7-Cyber Security at the Work Place
6
7.1-Section Intro
7.2-Cyber Security Policies
7.3-BYOD Management
7.4-A Sample BYOD Policy
7.5-The Security vs Ease of Access Paradox
7.6-Review Update
8-Cyber Warfare and Cyber Attacks Against Companies
3
8.1-Introduction to Cyber Warfare
8.2-The Colonial Pipeline Attack
8.3-The Sony Hack
9-Extras and Conclusion
5
9.1-Actionable Steps for Personal Security
9.2-SPECIAL LESSON - How to Launch your Career in Cyber Security
9.3-Getting your Certificate
9.4-Conclusion
9.5-Course Promo