Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Toolkit for Cybersecurity Professionals: Cybersecurity Fundamentals
Topic 1: Getting Started
1- Course Prerequisites (0:46)
2- The Course Manual (1:33)
Topic 2: Introduction to Cybersecurity
1- Overview of Cybersecurity (5:27)
2- The Impact of Cybersecurity on Businesses (10:21)
3- Cybersecurity Frameworks and Basic Principles (7:59)
4- Essential Cybersecurity Terminology (12:29)
Topic 3: Malware and Phishing
1- Malware Brief Overview (2:04)
2- Malware as A Cybersecurity Threat (7:57)
3- Types and Removal Strategies of Malware (8:10)
4- Phishing Threat Overview (2:01)
5- Detection and Prevention of Phishing Attacks (10:46)
Topic 4: Rogue Software, Drive-By Downloads and Cryptojacking
1- Rogue Software Overview (1:45)
2- Types of Rogue Software (4:02)
3- Strategies for Rogue Software Detection and Removal (8:07)
4- Understanding and Mitigating Drive-By Downloads (1:46)
5- Understanding and Mitigating Cryptojacking (2:05)
Topic 5: Advanced Cyber Threats and Defenses
1- Password Attack Overview (1:42)
2- Password: Attack Techniques and Best Practices (10:22)
3- Denial-of-Service (DoS) Attacks Overview (1:49)
4- Detecting and Mitigating of Denial-of-Service Attacks (12:53)
Topic 6: Tech Support, Ransomware and MitM Attacks
1- Detecting and Mitigating Tech Support Scams (11:27)
2- Understanding and Mitigating Ransomware (2:04)
3- Man in the Middle (MitM) Attacks Overview (1:48)
4- Detecting and Preventing Man-in-the-Middle Attacks (13:59)
Topic 7: Network Security
1- Firewall Implementation (6:28)
2- IDPS Implementation (8:18)
3- Designing and Segmenting Network architectures (5:37)
4- Implementing Virtual Local Area Networks (5:49)
5- Network Access and Secure Configuration (4:21)
Topic 8: Conclusion
The Next Step (3:22)
3- Man in the Middle (MitM) Attacks Overview
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock