Watch this tutorial on Cyber Security Training for Beginners in English! Cyber Security can be understood as the protection of computer systems and networks from unethical activities.
Welcome to cyber security for absolute beginners course. I’m glad to have you enrolled. You’re going to learn a lot in this course. So what I want to do in this video is just quickly go through everything that we’re going to cover cover in this course. So let’s go ahead and let’s take a look at the course curriculum. Alright, so let’s take a quick look at what we’re going to cover in the course. So the next section is going to be our introduction to cyber security section. In that section, we’re going to talk about what cyber security is and the different specialities within cyber security. We’re going to talk about why we cyber security and also the current state of cyber security. After that, we’re going to talk about hackers. So the next section is going to be on understanding hackers, where I’m going to talk about what hacking isn’t, the different types of hackers, hackers motivations, and also give you a high-level overview of the hacking methodology. After that, we’re going to go to our networking section. So in this section, I’m going to give you a quick crash course into computer networking because I want to prepare you for different topics and concepts that relate to network security later on in the course. After that, we’re going to jump into our malware threats section. In that section, we’re going to talk about a variety of different malware threats from viruses and worms and trojan horses and ransomware and a variety of other things. After that, we’re going to go into our additional threats and vulnerabilities section. This is going to be different threats and vulnerabilities that we face from a cyber-perspective in addition to malware threats. So things such as zero day attacks, protocol spoofing, denial of service attacks, web based attacks, and so forth. After that, we’re going to jump into our social engineering and email based threats section of the course. And in that section, we’re going to talk about social engineering. We’ll talk about email based threats as well. And we’ll actually have a couple of social engineering phone call scenarios that I put together for the course. After that, we’re going to jump into our core cyber security principles section of the course. And in that section, we’re going to talk about things such as the CIA triad, defense and depth, least privilege and risk management. Then after that, we’re going to jump into our fundamental threat countermeasures section of the course. So in that section, we’re going to talk about what we do to protect ourselves against hackers with things such as endpoint protection, encryption, firewalls, honeypots, VPN, DMZ, and a variety of other things. And then after that, we’re going to talk cyber security in the workplace. And this is going to be our final section. And in this section, we’re going to talk about businesses and organisations and specifically how they can leverage cyber security to help to protect themselves. So we’ll talk about things such as patch management and change management, incident response, security assessments, application development security and a variety of other things. So as you can see, we’re going to be covering a lot in this course. I did my best to make sure that we covered all the basics so you have a strong foundation of cyber security by the time you’re finish this course.
Views : 260