The Absolute Beginners Guide to Cyber Security – Part 1
General Introduction to Cyber Security
Welcome to the Course
Difference Between Information and Cyber Security
The CIA & DAD Triads
Basic Terminologies
Computer Protocols
Cookies
TCPIP
Section Quiz
Mind of a Hacker
Section Preview – World of Hacking
What is NOT Hacking
Types of Hackers
Hacking Methodology
The WhoIS Query
Social Engineering Tactics – Part 1
Social Engineering Tactics Part 2
Section Quiz
Attacks
Section Preview
Brute Force Attacks
Phishing
Bots and Botnets
DoS and DDoS Attacks
Pings
Man in the Middle Attack
SQL Injection Attack
Section Quiz
Malware
Malware Section Intro
Viruses and Worms
Trojans
Adware and Spyware
Ransomware
Other Types of Malware
Section Quiz
Defences
Section Preview
How an Antivirus Works
Encryption
Firewalls
Biometrics
Factor Authentication Methods
Honeypots and DMZs
Wireless Security
Passwords & PassPhrases
Section Quiz
Information Security at the Work Place
BYOD
A Sample BYOD Policy
Mobile Device Management
The Security vs Ease of Access Paradox
The Weakest Link and The Disgruntled Employee
Cyber Warfare and Cyber Attacks Against Companies
Cyberwarfare
The Attack Against Estonia
Stuxnet – The Attack Against Iran
The Sony Pictures Hack
Conclusion
Actionable Steps for Personal Security
Biggest Myths of Online Security
Conclusion
Previous Lesson
Next Lesson
Malware Section Intro
The Absolute Beginners Guide to Cyber Security – Part 1
Malware Section Intro
Previous Lesson
Back to Course
Next Lesson