Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Introduction to Cyber Security

Posted By: lucky_aut
Introduction to Cyber Security

Introduction to Cyber Security
Published 3/2024
Duration: 3h30m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 838 MB
Genre: eLearning | Language: English

Learn the basics of Cyber Security, including Phishing, Malware and Vulnerabilities.


What you'll learn
The basic principles of Cyber Security
Social Engineering Techniques
Malicious Attack Indicators
Wireless Network Attack Indicators
Threat Actors and Vectors
Vulnerability Concerns
Security Assessment Techniques
Penetration Testing Objectives

Requirements
No prior cyber security experience required.
IT background good to have but also not required.

Description
This course provides an introduction to Cyber Security fundamentals. It covers essential concepts such as the CIA triad, AAA framework, Social Engineering Techniques, Malicious Attack Indicators, Wireless Network Attack Indicators, Threat Actors and Vectors, Vulnerability Concerns, Security Assessment Techniques, and Penetration Testing Objectives. These topics serve as a foundation for understanding Cyber Security and initiating a career in this field. This course does not require a previous Cyber Security background, however some IT knowledge would help. Most of the topics covered in this course are also outlined on the CompTIA Security+ SYS 601 Exam Objectives.
Section 2 - Founding Principles
Founding Principles
Section 3 - Social Engineering Techniques
Social Engineering
Section 4 - Malicious Attack Indicators
Malware
Password Attacks
Malicious Attacks
Cloud vs On-Premise Attacks
Section 5 - Wireless Network Attack Indicators
Wireless Network Attacks - Wireless Attacks
Layer 2 Network Attacks
DNS/DoS Attacks
Section 6 - Threat Actors and Vectors
Threat Actors and Vectors
Section 7 - Vulnerability Concerns
Cloud vs On-Premise Vulnerability Concerns
Day to Day Vulnerability Concerns
Vendor and 3rd Party Vulnerability Concerns
Breach Impacts
Section 8 - Security Assessment Techniques
Security Assessment Techniques
Section 9 - Penetration Testing Objectives
Penetration Testing
Each section will end with a quiz to test your knowledge, and some labs will included throughout the course.
Thank you so much for taking this course, and looking forward to seeing you at the end!
Who this course is for:
Those looking to start their Cyber Security pathway.
Those looking to break into Cyber Security as a career.

More Info