Companies Home Search Profile

The Absolute Beginners Guide to Cyber Security 2023 - Part 1

Focused View

Alexander Oni

4:48:22

48 View
  • 001 Welcome to the Course.mp4
    06:54
  • 002 Who Am I Meet your Instructor.mp4
    10:01
  • 003 Connect with Me.mp4
    01:54
  • 004 Download the Guide Book.html
  • 004 The-Absolute-Beginners-Guide-to-Cyber-Security-Hand-Book.pdf
  • 001 Difference Between Information Security and Cyber Security.mp4
    03:29
  • 002 The Trinity of IT Security - CIA.mp4
    03:36
  • 003 Basic Terminologies.html
  • 004 Computer Protocols.mp4
    07:04
  • 005 Cookies.mp4
    05:44
  • 006 The TCPIP.mp4
    03:32
  • 001 Section Intro.mp4
    00:49
  • 002 This is NOT Hacking.mp4
    06:03
  • 003 Types of Hackers.mp4
    05:28
  • 004 The Hacking Methodology.mp4
    05:46
  • 005 The WhoIS Query.mp4
    05:39
  • 006 Social Engineering Tactics - Part 1.mp4
    11:31
  • 007 Social Engineering Tactics - Part 2.mp4
    14:19
  • 001 Intro to the Section.mp4
    00:42
  • 002 Brute Force Attacks.mp4
    04:17
  • 003 Phishing.mp4
    11:36
  • 004 Phishing - Part 2.mp4
    10:18
  • 005 Bots and Botnets.mp4
    03:27
  • 006 DoS and DDoS.mp4
    04:45
  • 007 Pings.mp4
    03:25
  • 008 Man in the Middle Attacks.mp4
    04:18
  • 009 SQL Injections.mp4
    05:01
  • 010 Supply Chain Attacks.mp4
    07:56
  • 001 Introduction to Malware.mp4
    01:10
  • 002 Viruses & Worms.mp4
    04:51
  • 003 Trojans.mp4
    07:28
  • 004 Adware and Spyware.mp4
    03:48
  • 005 Ransomware.mp4
    10:42
  • 006 Other Types of Malware.mp4
    03:38
  • 001 Section Intro.mp4
    00:46
  • 002 Firewalls.mp4
    04:13
  • 003 Encryption.mp4
    03:07
  • 004 Biometrics.mp4
    03:14
  • 005 Anti Virus.mp4
    04:34
  • 006 Factor Authentication Methods.mp4
    04:54
  • 007 Honey Pots and DMZs.mp4
    05:07
  • 008 Security for Wireless Networks.mp4
    06:40
  • 009 Password Management.mp4
    10:38
  • 001 Section Intro.mp4
    01:42
  • 002 Cyber Security Policies.mp4
    03:47
  • 003 BYOD Management.mp4
    03:06
  • 004 A Sample BYOD Policy.mp4
    06:15
  • 005 The Security vs Ease of Access Paradox.mp4
    05:20
  • 006 The Weakest Link & The Disgruntled Employee.mp4
    02:02
  • 007 Review Update.mp4
    02:42
  • 001 Introduction to Cyber Warfare.mp4
    02:25
  • 002 The Attack Against Estonia.mp4
    06:30
  • 003 Stuxnet and the Attack Against Iran.mp4
    04:30
  • 004 The Colonial Pipeline Attack.mp4
    04:35
  • 005 The Sony Hack.mp4
    03:31
  • 001 Actionable Steps for Personal Security.html
  • 002 SPECIAL LESSON - How to Launch your Career in Cyber Security.mp4
    08:36
  • 003 Getting your Certificate.mp4
    03:00
  • 004 Conclusion.mp4
    01:34
  • 005 Course Promo.mp4
    06:23
  • Description


    Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more

    What You'll Learn?


    • Understand the basic concepts and terminologies used in the information and cyber security fields
    • Take up entry roles for IT and Cybersecurity Positions
    • Differentiate between the various forms of malware and how they affect computers and networks
    • Understand how hackers actually hack

    Who is this for?


  • Students who want to learn the basics of computer and cyber security
  • Students who want to become IT or Cyber Security Experts
  • What You Need to Know?


  • You should know how to use a computer
  • You should know how to use the internet
  • More details


    Description

    ** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

    ** UPDATED JULY 2023 WITH NEW LESSON ON RANSOMWARE **

    Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.

    This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.

    Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.

    'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.'  - E. Wolfe

    "Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris Loyola

    PERFECT FOR COMPLETE BEGINNERS

    This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. 

    Course Curriculum

    In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.

    In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.

    Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as 

    • Phishing

    • Brute Force Attack

    • DoS & DDoS Attacks

    • Bots and Botnets

    • and much more

    We will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.

    In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work

    • Antivirus

    • Firewalls

    • Encryption

    • Biometrics

    • Authentication Methods

    • and much more

    Finally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.

    By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. 

    What are you waiting for??? Enroll in this best selling course today.

    Alex.

    Who this course is for:

    • Students who want to learn the basics of computer and cyber security
    • Students who want to become IT or Cyber Security Experts

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alexander Oni
    Alexander Oni
    Instructor's Courses
    My passion is teaching people through online courses in a fun and entertaining manner.  I have been teaching online for about 5 years now and during this period, I have created over 25 different courses with more than 132,000 students registered worldwide.What would you like to learn? Would you like to learn how to build and manage your WordPress website?Would you like to learn advanced skills that will make you a true WordPress developer?Would you like to learn how you can establish a successful career as a web developer?Would you like to learn the basics of information and cyber security? If you want to do any of these things, just enroll in the  course and  I'm always improving my courses so that they stay up to date and the  best that they can be. Check them out, and enroll today!MORE ABOUT ALEX:We all have one shot at life and as such, I believe in living life to the fullest. This means constantly stepping out of my comfort zone by visiting new places and trying out new things. My relative success on Udemy has given me both financial freedom and the ability to be location independent. I am currently travelling around the world spending about a month in one city (current location is Chiang Mai, Thailand) before moving on to the next. My hobbies include watching movies, sports and playing chess. I am also a huge Dead by Daylight gamer.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 56
    • duration 4:48:22
    • English subtitles has
    • Release Date 2023/11/21