Companies Home Search Profile

Introduction to Cybersecurity : Understanding and Preventing

Focused View

Raphael Asghar

4:45:20

7 View
  • 1. A NIGHTMARE.mp4
    01:09
  • 2. WELCOME TO LEARNING CYBERSECURITY.mp4
    02:20
  • 1. WHAT DOES CYBER MEAN.mp4
    01:47
  • 2. WHAT IS A NETWORK.mp4
    02:44
  • 3.1 cybersecurity DOCS (3).zip
  • 3. NETWORK TERMS.mp4
    01:53
  • 4. WHAT IS CYBERSECURITY.mp4
    05:00
  • 5. COMMON MYTHS OF CYBERSECURITY.mp4
    11:18
  • 6. WHY CYBERSECURITY MATTERS.mp4
    05:10
  • 7. PURPOSE OF CYBERSECURITY.mp4
    07:42
  • 8. PURPOSE OF CYBERSECURITY.mp4
    01:50
  • 9. EXAMPLE OF A HACK.mp4
    04:08
  • 1. WHO ARE THESE HACKERS.mp4
    01:09
  • 2. WHITE HAT HACKER AND MOTIVE.mp4
    04:01
  • 3. BLACK HAT HACKER AND MOTIVE.mp4
    04:26
  • 4. GRAY HAT HACKER AND MOTIVE.mp4
    02:56
  • 5. SCRIPT KIDDIES HACKER WITH MOTIVE.mp4
    02:08
  • 6. GREEN HACKER WITH MOTIVE.mp4
    02:15
  • 7. BLUE HACKER WITH MOTIVE.mp4
    03:16
  • 8. RED HACKER WITH MOTIVE.mp4
    02:31
  • 9. STATE SPONSORED HACKER WITH MOTIVE.mp4
    03:25
  • 10. HACKTIVIST WITH MOTIVE.mp4
    02:13
  • 1. TYPES OF ATTACKS.mp4
    04:23
  • 2. WHAT IS PHISHING EMAIL.mp4
    06:58
  • 3. WHAT IS DOS DDOS.mp4
    08:10
  • 4. WHAT IS MAN IN THE MIDDLE.mp4
    07:58
  • 5. WHAT IS PHISHING VISHING SMISHING.mp4
    07:07
  • 6. WHAT IS MALWARE.mp4
    06:47
  • 7. WHAT IS MALWARE PART 2.mp4
    08:13
  • 8. WHAT IS PASSWORD ATTACK.mp4
    09:16
  • 9. WHAT XSS ATTACK.mp4
    06:20
  • 10. WHAT IS SQL INJECTION.mp4
    04:53
  • 1. WHAT IS NETWORK IN DETAIL.mp4
    03:01
  • 2. GETTING DEVICES AND HOSTS.mp4
    09:04
  • 3. WHAT PRIVATE AND PUBLIC IP ADDRESS.mp4
    04:43
  • 4. VIEWING PRIVATE PUBLIC IP ADDRESS.mp4
    01:59
  • 5. WHAT IS THE DHCP SERVER.mp4
    12:42
  • 6. WHAT IS DNS SERVER.mp4
    05:44
  • 7. WHAT IS HTTP HTTPS SSL.mp4
    04:28
  • 8. WHAT IS ENCRYPTION.mp4
    07:17
  • 9. WHAT IS A FTP SERVER.mp4
    07:24
  • 10. WHAT ARE PORTS.mp4
    04:32
  • 11. NEXT STEP.mp4
    04:27
  • 1. PREVENTATIVE MEASURES VPN.mp4
    11:26
  • 2. PREVENTATIVE MEASURES ANTI VIRUS.mp4
    07:49
  • 3. PREVENTATIVE MEASURES PASSWORD.mp4
    06:54
  • 4. PREVENTATIVE MEASURES FIREWALL.mp4
    08:36
  • 5. PREVENTATIVE MEASURES 2FA.mp4
    03:15
  • 6. PREVENTATIVE MEASURES UPDATES.mp4
    05:09
  • 7. BACK UP YOUR FILES.mp4
    03:59
  • 8. TEACH ABOUT PHISHING.mp4
    05:19
  • 9. SOCIAL MEDIA.mp4
    05:42
  • 10. WRAPPING UP PREVENTATIVE MEASURES.mp4
    01:22
  • 11.1 apps needed.docx
  • 11. LINKS TO SQL EXPRESS.mp4
    01:22
  • 12. SQL EXPRESS BACKUP.mp4
    07:59
  • 13. CERTS AND SKILLS.mp4
    05:01
  • 14. ETHICAL HACKING EXAMPLE.mp4
    02:40
  • Description


    Foundations of Cybersecurity

    What You'll Learn?


    • Students will grasp the intricacies of various cyber threats, from common malware to sophisticated social engineering tactics, gaining insights into the methods
    • Students will develop a solid foundation in network components, mastering the essentials of secure communication infrastructures
    • Students will differentiate between different hacker personas, including white hats, black hats, and gray hats, understanding their motives and techniques
    • Through practical examples, students will learn to apply preventative methods such as encryption, firewalls, prevent phishing email ,and other strategic tools

    Who is this for?


  • This cybersecurity course is designed with the beginner in mind, offering an entry point into the world of digital security. As a student, you are not required to have an extensive background in cybersecurity or IT; The course assumes no prior knowledge of cybersecurity concepts, making it accessible to those who are taking their first steps into this field. Through a carefully crafted curriculum, you'll gradually build a strong foundation by learning about cyber threats, network components, hacker personas, and practical preventative measures.
  • What You Need to Know?


  • While no previous experience is needed for this course, it will greatly benefit the students if they have a basic understanding of computer usage and basic networking knowledge; however, all documentation, and examples are shown to the student step by step.
  • More details


    Description

    Welcome to the fascinating realm of cybersecurity, where the digital frontier demands vigilant guardians like yourself. I created and designed this course to empower you with the knowledge and skills necessary to navigate the ever-evolving landscape of cyber threats. It is for the absolute beginner, so no prior knowledge of cybersecurity is required.  However, an understanding of how the network works will greatly benefit you.  I divided this course into four sections to make it easier to navigate.

    First, delve into the fundamental understanding of cybersecurity, unraveling its significance and role in safeguarding digital assets.

    Second, explore the intricate web of network components, unraveling the complexities that underpin secure communication infrastructures.

    Third, journey further as you uncover the diverse personas of hackers, distinguishing between the white hats, black hats, and gray hats, each with their unique motives and methodologies. Unearth the myriad threats that lurk in the digital shadows, from malware to social engineering, and equip yourself with the knowledge to counteract these insidious forces.

    Finally, fortify your defenses by delving into preventative methods, embracing encryption, firewalls, and other strategic measures to fortify digital fortresses. Embark on this educational odyssey and emerge as a cyber guardian armed with the expertise to navigate, protect, and secure your digital landscape.

    Who this course is for:

    • This cybersecurity course is designed with the beginner in mind, offering an entry point into the world of digital security. As a student, you are not required to have an extensive background in cybersecurity or IT; The course assumes no prior knowledge of cybersecurity concepts, making it accessible to those who are taking their first steps into this field. Through a carefully crafted curriculum, you'll gradually build a strong foundation by learning about cyber threats, network components, hacker personas, and practical preventative measures.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Raphael Asghar
    Raphael Asghar
    Instructor's Courses
    Worked as a Production SQL Database Administrator and developer for over 15 years for various companies such as Neutrogena, BakeMark, Solutions2Go and NextGen.  Want to help those students that want more that the basic SQL Language.  Creating real life courses for those students who want a simple path to becoming a SQL DBA.  I love SQL Administration and all that is involved in managing and creating a stable SQL architecture environment. I want to pass that experience and information to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 56
    • duration 4:45:20
    • Release Date 2024/02/14