Cyber Security for Absolute Beginners: Essential Concepts
- Description
- Curriculum
- FAQ
- Reviews
LEARN CYBER SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS
Are you looking to learn the basics of cyber security? Are you an aspiring IT professional that needs to better understand how cybersecurity works? If so, this is the perfect course for you!
In this 4-hour course, I’ll show you step-by-step, the fundamentals of cyber security, teaching you essential cyber security core principles you need to know, as well as enlightening you about the various types of cyber threats we face.
If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!
WHAT YOU’LL RECEIVE IN THIS COURSE
-
4 Hours of Lecture & Live Demonstration Videos
-
37-Page Course Companion Study Guide eBook
-
2 Real-Life Business Case Studies
-
Edited Closed Caption Subtitles and Video Transcripts
-
Downloadable Course Videos for Offline Viewing with Udemy Mobile App
KEY COURSE TOPICS
-
Introduction to Cybersecurity
-
Understanding Hackers
-
Networking 101
-
Malware Threats
-
Additional Threats & Vulnerabilities
-
Social Engineering & Email Based Threats
-
Core Cyber Security Principles
-
Fundamental Threat Countermeasures
-
Cyber Security in the Workplace
Once you complete this course, you’ll understand the core principles of cyber security to help you better protect your IT and business infrastructure!
SO WHAT ARE YOU WAITING FOR? ENROLL TODAY!
PREVIEW OVER 30 MINUTES OF THIS COURSE THROUGH MY 12 FREE LECTURES, JUST SCROLL DOWN BELOW AND CLICK THE BLUE PREVIEW BUTTONS.
-
16Section Introduction
-
17What is a Computer Network?
-
18Some Basic Networking Rules
-
19Computer Protocols
-
20LANs versus WANs
-
21MAC versus IP Addresses
-
22Switches versus Routers
-
23TCP/IP Protocol Suite
-
24How the Internet Works (Simplified)
-
25Student Exercise #2: Identifying your MAC and IP Address (Windows and Mac OS)
-
34Section Introduction
-
35Zero-Day Attacks
-
36Buffer Overflows
-
37Protocol Spoofing
-
38DoS and DDoS Attacks
-
39Weak Encryption & Software Vulnerability Attacks
-
40Web-Based Attacks
-
41Evil Twin and Rogue Access Points
-
42Case Study #2: TJX Companies Inc. (TJX)
-
43Case Study Analysis #2: TJX Companies Inc.
-
55Section Introduction
-
56Multi-Factor Authentication
-
57Password Best Practices
-
58Endpoint Protection
-
59Encryption
-
60Firewalls
-
61Intrusion Detection & Prevention Systems (IDS/IPS)
-
62Utilizing a Network DMZ
-
63Honeypot Decoys
-
64Virtual Private Network (VPN)
-
65Wireless Networking Security
-
66Student Exercise #3: Exploring the Built-In Firewall (Windows and Mac OS)