2022 Beginner's guide to Cyber Security
- Description
- Curriculum
- FAQ
- Reviews
Why should you enroll?
Since we’ve been working in this field for over 15 years, we wanted to share part of what we’ve learned in all these years with people that are completely new to Cyber Security, or people that would like to understand the 2022 basics in this field.
You will find the general information mixed with real-life scenarios and real tips & tricks on how to protect from different threats.
Our goal is to use your time in the most efficient way, in order for you to get the most important content in the shortest time.
What will you know after taking our course?
1. A general introduction to Cyber Security, including an explanation of the CIA (Confidentiality, integrity, and availability) rating.
2. What is Malware (Viruses, Worms, Trojans, Bots, Adware, Spyware, Rootkits, and Ransomware).
3. Understanding different threats (Brute force, DDoS, Phishing, and Social engineering).
4. Guide on how do you protect yourself as an individual. This area will be focused on your devices and your data.
5. Bonus lecture: How are the jobs in Cyber Security? Should you consider this field?
Prerequisites
This course is designed for a general audience. No prior knowledge is required.
For different specific terms, you will have an explanation in the notes.
-
2Introduction General definitionsVideo lesson
Introduction General Definitions - In this Chapter you will learn more about what is Cybersecurity, Infosec, Asset, Vulnerability, Threat, IT Risk.
-
3General definitionsVideo lesson
General Definitions - in this lesson you will learn more about what is Cybersecurity, Infosec, Asset, Vulnerability, Threat, IT Risk.
-
4Introduction to CIA modelVideo lesson
Introduction to CIA Model - Confidentiality, integrity, and availability. This is also known as the CIA triad, and it is a model designed to guide policies for information security within an enterprise/organization.
-
5CIA modelVideo lesson
CIA Model lesson - Confidentiality, integrity, and availability. This is also known as the CIA triad, and it is a model designed to guide policies for information security within an enterprise/organization.
-
6QuizQuiz
-
7Introduction to MalwareVideo lesson
Introduction to Malware (Viruses, Worms, Trojans, Bots, Ransomware, Adware, Spyware and Rootkit)
-
8Malware (Viruses, Worms, Trojans, Bots, Ransomware, Adware, Spyware and Rootkit)Video lesson
Malware Lecture - In this lesson you will learn what Malware is and then we will dive into different types of malware like Viruses, Worms, Trojans, Bots, Ransomware, Adware, Spyware and Rootkits. We will also show a unique matrix that will make you understand the difference and similarities between these different types of malware.
-
9Introduction to DoS & DDoSVideo lesson
Introduction to DoS (Denial-of-service attack) and DDoS (Distributed Denial-of-service attack)
-
10DoS & DDoSVideo lesson
DoS (Denial-of-service attack) and DDoS (Distributed Denial-of-service attack) lecture - in this lesson we will explain what a DoS and DDoS are and we will show you some real-life examples.
-
11Introduction to Brute forceVideo lesson
Introduction to Brute Force Attacks
-
12Brute ForceVideo lesson
Brute Force Attacks lecture - in this lesson you will learn what a brute force attack is, what different types of attacks are out there and we will further investigate how secure your passwords really are and what are the tips & tricks that can help you improve this area.
-
13Introduction to PhishingVideo lesson
Introduction to Phishing
-
14PhishingVideo lesson
Phishing Lecture - we will start this lesson with a general explanation of the phishing area, explore and analyze the different types and show how you can protect yourself by having a look at common features of phishing. Finally, we will test our knowledge with an example phishing email.
-
15QuizQuiz
External Links May Contain Affiliate Links read more