Cyber Security - Learn Data Security & Combat Cyber Threats

Cyber Threats, Attacks, Viruses, Security Measures, Cyber Crimes, Firewalls, Cyber Security Concepts, Digital Forensics

4.53 (20 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
134
students
8 hours
content
May 2022
last update
$199.99
regular price

What you will learn

Explain the differences between Threat, Vulnerability, and Risk

Explore the needed skills set and job profiles in the field of Cybersecurity

Discuss the evolution of threats and the types of security goals

Define what cybersecurity is

Learn the Importance of Cybersecurity

Differentiate Networking Devices such as Router and Switch

Differentiate IP, MAC, and PORT Address

Define DNS and VPN

Learn Hacking and the different Types of Hackers

Learn the fundamentals of networking

Discuss the layers of the OSI Model

Explain the different networking protocols such as TCP, HTPP, UDP, ARP, and DHCP

How to troubleshoot a network

Learn the different types of attacks

Know the different types of malware

Explain the Man in the Middle and Denial of Service Attack

Discuss what is Distributed Denial of Service Attack

How to recognize Sniffing, Phishing, SQL Injection, Cross-site Scripting, and Post Scanning Attack

Define Cryptography and why we need it

Discuss important terminologies in Cryptography

Know the different types of ciphers

Learn the advantages and disadvantages of Symmetric and Asymmetric Keys

Learn what is Digital Signature and the Signing and Verification Process

Know how to check the Integrity of a Message

Discuss the different security measures

Learn the various types of firewalls

Learn Cyber Law and why there is a need for it

Discuss the classifications of cyber crime

Definition, Process, and Types of Digital Forensics

Create KALI Linux Virtual Machine in VMWARE

Description

Get instant access to an 87-page workbook of Cyber Security Awareness

Introduce yourself to our community of students in this course and tell us your goals

Encouragement and celebration of your progress every step of the way: 25% > 50% > 75% & 100%

8 hours of clear and concise step by step instructions, lessons, and engagement

This course is designed for anyone who is interested in learning more about cyber security and how to combat the very real threats that everyone faces from hacking and catastrophic loss of data. This course is beginner-friendly, does not require technical cyber security skills, and is meant for everyone who wishes to help secure their own data, and their organisation's data from hackers and cyber threats.

What  you will learn:

  • Define what cyber security is

  • Discuss the evolution of threats and the types of security goal

  • Learn the Importance of cyber security

  • Explain the differences between Threat, Vulnerability, and Risk

  • Differentiate Networking Devices such as Router and Switch

  • Differentiate IP, MAC, and PORT Address

  • Define DNS and VPN

  • Learn Hacking and the different Types of Hackers

  • Explore the needed skills set and job profiles in the field of cyber security

  • Learn the fundamentals of networking and security

  • Discuss the layers of the OSI Model

  • Explain the different networking protocols such as TCP, HTPP, UDP, ARP, and DHCP

  • How to troubleshoot a network to improve security

  • Learn the different  attacks

  • Know the different types of malware and how they affect security

  • Explain the Man in the Middle and Denial of Service Attack

  • Discuss what is Distributed Denial of Service Attack

  • How to recognize Sniffing, Phishing, SQL Injection, Cross-site Scripting, and Post Scanning Attack

  • Define Cryptography and why we need it for cyber security

  • Discuss important terminologies in Cryptography

  • Know the different ciphers

  • Learn the advantages and disadvantages of Symmetric and Asymmetric Keys

  • Learn what is Digital Signature and the Signing and Verification Process

  • Know how to check the Integrity of a Message

  • Discuss the different security measures

  • Learn the various types of firewalls and their security

  • Learn Cyber Law and why there is a need for it

  • Discuss the classifications of cyber crime

  • Definition, Process and Digital Forensics

  • ...and more!

Contents and Overview

You'll start with What is Cyber security; Evolution of Cyber Threats; Three Types of Security Goals; Importance of cyber security; Threat, Vulnerability, and Risk; Networking Devices such as Router and Switch; What is an IP Address; What is a MAC Address; What is a PORT Address; What is DNS and VPN; Learn Hacking and the different Types of Hackers; Job Profiles in the field of cyber security; Important cyber security Skills.

Then you will learn about Computer Networks; The OSI Model; OSI Layers Protocols; HTTP Protocol; TCP Protocol; UDP Protocol; the Difference between UDP and TCP Protocol; DHCP Protocol; ARP Protocol; What is an IP address and its types; What is a Port Address and its types; Network Troubleshooting; What is an Attack; Categories of Cyber Attacks; Password attack and its types; Malware Attack; Types of Malware; Man in the Middle Attack; Sniffing Attack; DOS Attack; What is DDOS Attack; Phishing Attack; SQL Injection Attack; Example of SQL Injection Attack; Cross-site Scripting Attack; Post Scanning Attack.

We will also cover Post Scanning Attack; The Need for Cryptography; Basic Cryptography System; What is Encryption; What is Decryption; Define Plain text; What is Secret Key; What is Cipher text; Cryptography System; Cryptography in everyday life; Types of Cryptography; Symmetric Key Cryptography; Asymmetric Key Cryptography; What is Hashing; Hashing Algorithm; Techniques of Hashing; What is Substitution Cipher; What is Transposition Cipher; Cesar Cipher and how it works; Transposition Cipher; Stream Cipher; Block Cipher; Advantages of Symmetric Key Cryptography; Why Asymmetric key cryptography is important; Advantages of Asymmetric Key Cryptography; Digital Signature; Signing and Verification Process; How to check the Integrity of a Message and increase security

This course will also tackle Security Measures; What is a Firewall; Types of Firewall; Cyber Law; Why there is a need for  Cyber Law; What is Cyber Crime; Classification of Cyber Crime; Cyber Crimes Against Person; Cyber Crime Against Persons Property; Cyber Crime against Government; Cyber Crime against Society at Large; Definition of Digital Forensics; Process of Digital Forensics; Digital Forensics.

Who are the Instructors?

Vijal Jain is your lead instructor – a professional making a living from teaching cyber security. As a cyber security expert, she has joined with content creator Peter Alkema to bring you this amazing new course.

You'll get premium support and feedback to help you become more confident with finance!

Our happiness guarantee...

We have a 30-day 100% money-back guarantee, so if you aren't happy with your purchase, we will refund your course - no questions asked!

We can't wait to see you on the course!

Enroll now, and we'll help you improve your cyber security !

Peter and Digital Regenesys

Screenshots

Cyber Security - Learn Data Security & Combat Cyber Threats - Screenshot_01Cyber Security - Learn Data Security & Combat Cyber Threats - Screenshot_02Cyber Security - Learn Data Security & Combat Cyber Threats - Screenshot_03Cyber Security - Learn Data Security & Combat Cyber Threats - Screenshot_04

Content

Introduction

Introduction
Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals
Let's Celebrate Your Progress In This Course: 25% > 50% > 75% > 100%!!
Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course

Introduction to Cybersecurity

Cyber Security Course Overview
Introduction of Facilitator
Is our Data really safe on internet
What is Cybersecurity
Evolution of Cyber Threats
Three Types of Security Goals
Importance of Cybersecurity
Threat, Vulnerability, and Risk
Networking Devices: Router
Networking Devices: Switch
What is an IP Address
What is a MAC Address
What is a PORT Address
What is a DNS
What is a VPN
What is a Virus
Learn Hacking and the different Types of Hackers
Job Profiles in the field of Cybersecurity
Important Cybersecurity Skills

Fundamentals of Networking

Fundamentals of Networking-Overview
Computer Networks
The OSI Model
OSI Model: Application Layer
OSI Model: Presentation Layer
OSI Model: Session Layer
OSI Model: Transport Layer
OSI Model: Network Layer
OSI Model: Data Link Layer
OSI Model: Physical Layer
OSI Layers Example
OSI Layers Protocols
HTTP Protocol
You've Achieved 25% >> Let's Celebrate Your Progress And Keep Going To 50% >>
TCP Protocol
UDP Protocol
Difference between UDP and TCP Protocol
DHCP Protocol
ARP Protocol
What is an IP address and its types
What is a Port Address and its types
Network Troubleshooting

Types of Attacks part 1

What is an Attack
Categories of Cyber Attacks
Types of Attacks
Password attack and its types
Malware Attack
Types of Malware: Worms
Types of Malware: Viruses
Types of Malware: Trojan
Types of Malware: Adware
Types of Malware: Spyware
Types of Malware: Crimeware
Types of Malware: Rootkit
Types of Malware: Ransomware
Man in the Middle Attack
Man in the Middle Attack Example
Sniffing Attack
DOS Attack
DOS Attack Example

Types of Attacks part 2

What is DDOS Attack
DDOS Attack Example
Phishing Attack
Phishing Attack Example
SQL Injection Attack
Example of SQL Injection Attack
Cross-site Scripting Attack
Post Scanning Attack

Cybersecurity Quiz 1

Test your knowledge
Assessment

Cryptography part 1

What is Cryptology
The Need for Cryptography
Basic Cryptography System
What is Encryption
What is Decryption
Define Plain text
You've Achieved 50% >> Let's Celebrate Your Progress And Keep Going To 75% >>
What is Secret Key
What is Cipher text
Cryptography System
Cryptography in everyday life
Types of Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography
What is Hashing
Hashing Algorithm
Techniques of Hashing

Cryptography part 2

What is Substitution Cipher
What is Transposition Cipher
Cesar Cipher and how it works
Example of Cesar Cipher
Transposition Cipher
Example of Transposition Cipher
Stream Cipher
Block Cipher
Advantages of Symmetric Key Cryptography
Why Asymmetric key cryptography is important
Advantages of Asymmetric Key Cryptography
Digital Signature
Signing and Verification Process
How to check the Integrity of a Message

Security Measures

Security Measures
What is Firewall
Types of Firewall: Packet Filter
Types of Firewall: Stateful Inspection Firewall
Types of Firewall: Proxy-server firewall

Cyber Law

Cyber Law
Why there is a need for Cyber Law
What is Cyber Crime
Classification of Cyber Crime
Cyber Crimes Against Person - Cyber Stalking
Cyber Crimes Against Person - Dissemination of obscene Material
Cyber Crimes Against Person - Defamation
Cyber Crimes Against Person - Hacking
Cyber Crimes Against Person - Cracking
Cyber Crimes Against Person - Email and SMS Spoofing
You've Achieved 75% >> Let's Celebrate Your Progress And Keep Going To 100% >>
Cyber Crimes Against Person - Carding
Cyber Crimes Against Person - Cheating and Fraud
Cyber Crimes Against Person - Assault by Threat
Cyber Crime Against Persons Property
Cyber Crime against Government
Cyber Crime against Society at Large

Cybersecurity Quiz 2

Test your knowledge
Assessment

Digital Forensics

Definition of Digital Forensics
Process of Digital Forensics
Types of Digital Forensics

Cybersecurity Quiz 3

Test your knowledge
Assessment
You've Achieved 100% >> Let's Celebrate! Remember To Share Your Certificate!!

Reviews

Lonwabo
May 5, 2022
There are lots of things that are interesting in this course, especially that nowadays we are using internet to look for jobs, buying things etc.

Charts

Price

Cyber Security - Learn Data Security & Combat Cyber Threats - Price chart

Rating

Cyber Security - Learn Data Security & Combat Cyber Threats - Ratings chart

Enrollment distribution

Cyber Security - Learn Data Security & Combat Cyber Threats - Distribution chart
4600492
udemy ID
3/17/2022
course created date
5/3/2022
course indexed date
Bot
course submited by