Cyber Security: From Beginner to Expert (2023)
- Description
- Curriculum
- FAQ
- Reviews
A beginner level comprehensive course that includes step-by-step explanations of core security concepts along with follow-up quizzes and hands on labs to ensure a solid learning for the course taker.
Designed by a CyberSecurity expert with a PhD degree and premium Cybersecurity certifications, this course has been designed to make it extremely simple to learn complex Cyber Security concepts. Designed for beginner Cyber Security professionals, this course will help you master the major domains and launch a successful career in the Cyber Security industry. It is also a good starting point for students targeting Cyber Security certifications like CompTIASecurity+ and CEH. Please check out our free samples videos to see how complex concepts have been explained in an easy way!
Salient features include:
-
Step by step and easy to follow videos that don’t assume any prior knowledge
-
Hands on labs to develop practical skills required in jobs
-
Quizzes at the end of each section to test knowledge about each area
-
PhD instructor with 10+ years of industry experience as well as teaching experience
-
Sample interview questions and tips
-
CISSP certified instructor
-
30 day money-back guarantee
Domains covered:
-
Foundations of Cybersecurity (CIA, Security Governance, Identity Federation, Cryptography, Hashing, Digital Signatures)
-
Network Security (Primer on Computer Networks, Protocols, HTTPs, TLS/SSL, VPNs, IPSec, SSH, Firewalls, NAT, Port Scans)
-
Cyber Attacks (Man-in-the-Middle Attack, DoS/DDoS, Password Attacks, Social Engineering, Network Attacks)
-
Web Application Security (Web App Architecture, SQL Injections, Blind SQL Injections, Cross-Site Scripting)
-
Malware (Viruses, Worms, Trojans, Spyware, Adware, Ransomware, Logic Bombs and Root kits, Anti-malware)
Unlike other courses, this is a comprehensive course that covers both theory and practice.
Our 6 hands-on labs will teach you skills which you can directly use in your job:
-
Practice cryptography by generating public-private keys using RSA, encrypt data using public key and decrypt using private key
-
Employ hashing to verify the integrity of received data by leveraging MD5 hashing algorithm
-
Spot phishing emails, investigate whether the links or attachments are malicious and if you should block the domain
-
Carry out port scanning and discover which services are running on your web server
-
Carry out an actual SQL injection attack on a website and learn how to prevent these attacks
-
Carry out a blind SQL injection attack on a website by leveraging boolean and time-base inference techniques
-
1Welcome to the CourseVideo lesson
-
2The CIA TriadVideo lesson
-
3Practice Activity: The CIA TriadVideo lesson
-
4Identity and Access Management IVideo lesson
-
5Identity and Access Management IIVideo lesson
-
6Identity FederationVideo lesson
-
7Security Governance: Policies, Standards and ProceduresVideo lesson
-
8Security Governance: GDPR, HIPAA, PCI-DSS and Intellectual PropertyVideo lesson
-
9CryptographyVideo lesson
After completing the lecture, please download the practice activity in the next lecture.
-
10Practice Activity: CryptographyText lesson
-
11Hashing and Digital SignaturesVideo lesson
-
12Lab: HashingVideo lesson
Practice Activity: Please try the lab first then try the Practice Activity in the next lecture.
-
13Practice Activity: HashingText lesson
-
14Quiz (Foundations)Quiz
-
15Introduction: OSI and TCP/IPVideo lesson
-
16Application and Transport LayersVideo lesson
-
17DNS (Domain Name System)Video lesson
-
18The Network LayerVideo lesson
-
19The Link LayerVideo lesson
-
20Security Protocols: SSL/TLS, IPSec, VPNs, SSHVideo lesson
-
21Lab SetupText lesson
Lab setup instructions for setting up the Kali Linux Virtual Machine for VirtualBox or VMware
-
22Lab: Port ScanningVideo lesson
-
23NAT: Network Address TranslationVideo lesson
-
24FirewallsVideo lesson
-
25Wireless Networks and SecurityVideo lesson
-
26Quiz (Network Security)Quiz
-
27Password AttacksVideo lesson
-
28DoS and DDoSVideo lesson
-
29DNS AttacksVideo lesson
-
30Network AttacksVideo lesson
-
31Man in the Middle AttackVideo lesson
-
32Social EngineeringVideo lesson
-
33Lab (no installation required): Phishing Attack and InvestigationVideo lesson
-
34Quiz (Cyber Attacks)Quiz
-
35Web Application ArchitectureVideo lesson
-
36SQL InjectionVideo lesson
-
37Lab: SQL InjectionVideo lesson
-
38Blind SQL InjectionVideo lesson
-
39Lab: Blind SQL InjectionVideo lesson
-
40Mitigating SQL Injection AttacksVideo lesson
-
41XSS: Cross Site ScriptingVideo lesson
-
42Vulnerability ManagementVideo lesson
-
43Quiz (Web Application Security)Quiz
