The Absolute Beginners Guide To Cyber Security 2024 – Part 1
Last updated 2/2024
MP4 | Video: h264, 1920×1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.07 GB | Duration: 4h 53m
Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more
What you’ll learn
Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Understand how hackers actually hack
Requirements
You should know how to use a computer
You should know how to use the internet
Description
** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **** UPDATED DECEMBER 2023 WITH NEW LESSON ON RANSOMWARE **Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.’An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.’ – E. Wolfe"Great intro to Cyber Security. I currently work in IT and I’m considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." – Chris LoyolaPERFECT FOR COMPLETE BEGINNERSThis course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. Course CurriculumIn the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as PhishingBrute Force AttackDoS & DDoS AttacksBots and Botnetsand much moreWe will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following workAntivirusFirewallsEncryptionBiometricsAuthentication Methodsand much moreFinally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. What are you waiting for??? Enroll in this best selling course today.Alex.
Overview
Section 1: Welcome to the Course
Lecture 1 Welcome to the Course
Lecture 2 Who Am I? Meet your Instructor
Lecture 3 Connect with Me
Lecture 4 Download the Guide Book
Section 2: General Introduction to IT & Cyber Security
Lecture 5 Difference Between Information Security and Cyber Security
Lecture 6 The Trinity of IT Security – CIA
Lecture 7 Basic Terminologies
Lecture 8 Computer Protocols
Lecture 9 Cookies
Lecture 10 The TCP/IP
Section 3: Hackers – Who are They?
Lecture 11 Section Intro
Lecture 12 This is NOT Hacking
Lecture 13 Types of Hackers
Lecture 14 The Hacking Methodology
Lecture 15 The WhoIS Query
Lecture 16 Social Engineering Tactics – Part 1
Lecture 17 Social Engineering Tactics – Part 2
Section 4: Attacks
Lecture 18 Intro to the Section
Lecture 19 Brute Force Attacks
Lecture 20 Phishing
Lecture 21 Phishing – Part 2
Lecture 22 Bots and Botnets
Lecture 23 DoS and DDoS
Lecture 24 Pings
Lecture 25 Man in the Middle Attacks
Lecture 26 SQL Injections
Lecture 27 Supply Chain Attacks
Section 5: Malware
Lecture 28 Introduction to Malware
Lecture 29 Viruses & Worms
Lecture 30 Trojans
Lecture 31 Adware and Spyware
Lecture 32 Ransomware
Lecture 33 Other Types of Malware
Section 6: Defences
Lecture 34 Section Intro
Lecture 35 Firewalls
Lecture 36 Encryption
Lecture 37 Biometrics
Lecture 38 Anti Virus
Lecture 39 Factor Authentication Methods
Lecture 40 Honey Pots and DMZs
Lecture 41 Security for Wireless Networks
Lecture 42 Password Management
Section 7: Cyber Security at the Work Place
Lecture 43 Section Intro
Lecture 44 Cyber Security Policies
Lecture 45 BYOD Management
Lecture 46 A Sample BYOD Policy
Lecture 47 The Security vs Ease of Access Paradox
Lecture 48 Review Update
Section 8: Cyber Warfare and Cyber Attacks Against Companies
Lecture 49 Introduction to Cyber Warfare
Lecture 50 The Colonial Pipeline Attack
Lecture 51 The Sony Hack
Section 9: Extras and Conclusion
Lecture 52 Actionable Steps for Personal Security
Lecture 53 SPECIAL LESSON – How to Launch your Career in Cyber Security
Lecture 54 Getting your Certificate
Lecture 55 Conclusion
Lecture 56 Course Promo
Students who want to learn the basics of computer and cyber security,Students who want to become IT or Cyber Security Experts
rapidgator.net/file/7ec041605020394e28043ec37b680cc3/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part5.rar.html
[url=https://rapidgator.net/file/398dcdf3f79605182a0538aa2e8e929a/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part4.rar.html]https://rapidgator.net/file/398dcdf3f79605182a0538aa2e8e929a/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part4.rar.html[/url]
[url=https://rapidgator.net/file/4f8f02bf96fc946d0969c02663fcfe65/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part3.rar.html]https://rapidgator.net/file/4f8f02bf96fc946d0969c02663fcfe65/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part3.rar.html[/url]
[url=https://rapidgator.net/file/587ec0946e46660b9ea5c5b95ef3705a/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part2.rar.html]https://rapidgator.net/file/587ec0946e46660b9ea5c5b95ef3705a/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part2.rar.html[/url]
[url=https://rapidgator.net/file/18225d1601e945c54061f5b5e6fb9c75/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part1.rar.html]https://rapidgator.net/file/18225d1601e945c54061f5b5e6fb9c75/The_Absolute_Beginners_Guide_to_Cyber_Security_2024_Part_1.part1.rar.html[/url]