Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Absolute Beginners Guide to Cyber Security - Part 1
General Introduction to Cyber Security
Welcome to the Course (1:59)
Difference Between Information and Cyber Security (2:37)
The CIA Triad (3:11)
Basic Terminologies
Computer Protocols (7:04)
Cookies
TCP/IP (3:32)
Mind of a Hacker
World of Hacking Section Intro (0:57)
What is NOT Hacking (4:26)
Hacking Methodology (3:47)
Types of Hackers (7:18)
The WhoIS Query (5:39)
Social Engineering (3:36)
Attacks
Attacks Section Intro (0:49)
Brute Force Attacks (4:17)
Phishing and Spoofing (5:14)
Bots and Botnets (3:27)
DoS and DDoS Attacks (4:44)
Pings (3:25)
Man in the Middle Attack (4:18)
SQL Injection Attack (5:01)
Malware
Malware Section Intro (1:03)
Viruses and Worms (4:51)
Trojans (7:19)
Adware and Spyware (3:59)
Ransomware (7:15)
Other Types of Malware (3:38)
Defences
Defences Section Intro (0:42)
How an Antivirus Works (4:34)
Encryption (3:07)
Firewalls (4:13)
Biometrics (3:14)
Factor Authentication Methods (4:54)
Honeypots and DMZs (5:07)
Wireless Security (2:08)
Password Management (6:27)
Information Security at the Work Place
BYOD (3:06)
A Sample BYOD Policy (6:15)
The Security vs Ease of Access Paradox (3:07)
The Weakest Link and The Disgruntled Employee (2:02)
Cyber Warfare and Cyber Attacks Against Companies
Cyberwarfare (2:25)
The Attack Against Estonia (6:30)
Stuxnet - The Attack Against Iran (4:29)
The Sony Pictures Hack (3:31)
Conclusion
Biggest Myths of Online Security (7:01)
Conclusion (1:48)
Cyberwarfare
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock