The Absolute Beginners Guide To Cyber Security 2024 - Part 1

martinstronis65

U P L O A D E R
k1ESyUEmjLFE7bp8kIAEpctWjD9paCgZ.jpg

The Absolute Beginners Guide To Cyber Security 2024 - Part 1
Last updated 2/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.07 GB | Duration: 4h 53m​

Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more

What you'll learn
Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Understand how hackers actually hack

Requirements
You should know how to use a computer
You should know how to use the internet

Description
** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **** UPDATED DECEMBER 2023 WITH NEW LESSON ON RANSOMWARE **Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.' - E. Wolfe"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris LoyolaPERFECT FOR COMPLETE BEGINNERSThis course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. Course CurriculumIn the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as PhishingBrute Force AttackDoS & DDoS AttacksBots and Botnetsand much moreWe will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following workAntivirusFirewallsEncryptionBiometricsAuthentication Methodsand much moreFinally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. What are you waiting for??? Enroll in this best selling course today.Alex.

Overview
Section 1: Welcome to the Course

Lecture 1 Welcome to the Course

Lecture 2 Who Am I? Meet your Instructor

Lecture 3 Connect with Me

Lecture 4 Download the Guide Book

Section 2: General Introduction to IT & Cyber Security

Lecture 5 Difference Between Information Security and Cyber Security

Lecture 6 The Trinity of IT Security - CIA

Lecture 7 Basic Terminologies

Lecture 8 Computer Protocols

Lecture 9 Cookies

Lecture 10 The TCP/IP

Section 3: Hackers - Who are They?

Lecture 11 Section Intro

Lecture 12 This is NOT Hacking

Lecture 13 Types of Hackers

Lecture 14 The Hacking Methodology

Lecture 15 The WhoIS Query

Lecture 16 Social Engineering Tactics - Part 1

Lecture 17 Social Engineering Tactics - Part 2

Section 4: Attacks

Lecture 18 Intro to the Section

Lecture 19 Brute Force Attacks

Lecture 20 Phishing

Lecture 21 Phishing - Part 2

Lecture 22 Bots and Botnets

Lecture 23 DoS and DDoS

Lecture 24 Pings

Lecture 25 Man in the Middle Attacks

Lecture 26 SQL Injections

Lecture 27 Supply Chain Attacks

Section 5: Malware

Lecture 28 Introduction to Malware

Lecture 29 Viruses & Worms

Lecture 30 Trojans

Lecture 31 Adware and Spyware

Lecture 32 Ransomware

Lecture 33 Other Types of Malware

Section 6: Defences

Lecture 34 Section Intro

Lecture 35 Firewalls

Lecture 36 Encryption

Lecture 37 Biometrics

Lecture 38 Anti Virus

Lecture 39 Factor Authentication Methods

Lecture 40 Honey Pots and DMZs

Lecture 41 Security for Wireless Networks

Lecture 42 Password Management

Section 7: Cyber Security at the Work Place

Lecture 43 Section Intro

Lecture 44 Cyber Security Policies

Lecture 45 BYOD Management

Lecture 46 A Sample BYOD Policy

Lecture 47 The Security vs Ease of Access Paradox

Lecture 48 Review Update

Section 8: Cyber Warfare and Cyber Attacks Against Companies

Lecture 49 Introduction to Cyber Warfare

Lecture 50 The Colonial Pipeline Attack

Lecture 51 The Sony Hack

Section 9: Extras and Conclusion

Lecture 52 Actionable Steps for Personal Security

Lecture 53 SPECIAL LESSON - How to Launch your Career in Cyber Security

Lecture 54 Getting your Certificate

Lecture 55 Conclusion

Lecture 56 Course Promo

Students who want to learn the basics of computer and cyber security,Students who want to become IT or Cyber Security Experts
Screenshot


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten