The Absolute Beginners Guide to Cyber Security


The Absolute Beginners Guide to Cyber Security




Created by:  Alexander Oni
Experienced Online Instructor
English

Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.
This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well-rounded knowledge about the basic concepts used in the world of information security.


'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.'  - E. Wolfe

"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris Loyola

PERFECT FOR COMPLETE BEGINNERS

This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. 

Course Curriculum

In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.
In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.
Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as 

  • Phishing
  • Brute Force Attack
  • DoS & DDoS Attacks
  • Bots and Botnets
  • and much more
We will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.
In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work

  • Antivirus
  • Firewalls
  • Encryption
  • Biometrics
  • Authentication Methods
  • and much more
Finally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.
By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. 

Project Description

For our class project, I would like you to go over the several articles I have attached. The articles are there to provide you with additional knowledge about cyber security.

Course Contents
  1. Welcome to the Course
  2. First things First
  3. Difference Between Information and Cyber Security
  4. The CIA Triad
  5. The Security vs Ease of Access Paradox
  6. Computer Protocols
  7. TCPIP
  8. World of Hacking Section Intro
  9. What is NOT Hacking
  10. Types of Hackers
  11. Hacking Methodology
  12. The WhoIS Query
  13. Social Engineering
  14. Attacks Section Intro
  15. Brute Force Attacks
  16. Phishing and Spoofing
  17. Bots and Botnets
  18. DoS and DDoS Attacks
  19. Pings
  20. Man in the Middle Attack
  21. SQL Injection Attack
  22. Malware Section Intro
  23. Viruses and Worms
  24. Trojans
  25. Adware and Spyware
  26. Ransomware
  27. Other Types of Malware
  28. Defences Section Intro
  29. How an Antivirus Works
  30. Encryption
  31. Firewalls
  32. Biometrics
  33. Factor Authentication Methods
  34. Honeypots and DMZs
  35. Wireless Security
  36. Password Management
  37. BYOD
  38. A Sample BYOD Policy
  39. The Security vs Ease of Access Paradox
  40. The Weakest Link and The Disgruntled Employee
  41. Cyberwarfare
  42. The Attack Against Estonia
  43. Stuxnet The Attack Against Iran
  44. The Sony Pictures Hack
  45. The Weakest Link and The Disgruntled Employee
  46. Biggest Myths of Online Security
  47. Conclusion

Total Size: 2.1GB

Download Course

https://www.skillshare.com/classes/The-Absolute-Beginners-Guide-to-Cyber-Security

Post a Comment

0 Comments