Introduction to Cyber Security

Introduction to Cyber Security Step By Step to start your Career

4.06 (44 reviews)
Udemy
platform
English
language
Network & Security
category
Introduction to Cyber Security
2,512
students
42 mins
content
Jan 2022
last update
FREE
regular price

What you will learn

What is Cyber Security

The CIA triad

Security Terminologies

Types of Hackers

Cyber Security Attacks

Top 10 Cyber Threats

Cyber Security Careers

10 Best Practices on Cyber Security

Description

What is ethical hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization’s security posture. With prior approval from the organization or owner of the IT asset, the mission of ethical hacking is opposite from malicious hacking.


How are ethical hackers different than malicious hackers?

Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach.

An ethical hacker reports the identified vulnerabilities to the organization. Additionally, they provide remediation advice. In many cases, with the organization’s consent, the ethical hacker performs a re-test to ensure the vulnerabilities are fully resolved.

Malicious hackers intend to gain unauthorized access to a resource (the more sensitive the better) for financial gain or personal recognition. Some malicious hackers deface websites or crash backend servers for fun, reputation damage, or to cause financial loss. The methods used and vulnerabilities found remain unreported. They aren’t concerned with improving the organizations security posture.

Content

Introduction to Cyber Security

What is Cyber Security
The CIA triad
Security Terminologies
Types of Hackers
Hacking Methodology
Cyber Security Attacks
Cyber Security Malwares
Cyber Security Defenses
Cyber Warfare
The Attack Against Estonia
Stuxnet and the Attack Against Iran
The Sony Hack
Cyber Security Careers
Top 10 Cyber Threats
10 Best Practices on Cyber Security

Charts

Price

Introduction to Cyber Security - Price chart

Rating

Introduction to Cyber Security - Ratings chart

Enrollment distribution

Introduction to Cyber Security - Distribution chart
4306573
udemy ID
9/18/2021
course created date
9/20/2021
course indexed date
Angelcrc Seven
course submited by