Language: English | VTT | Size: 821 MB | Duration: 15 section | 65 lectures | (1h 50m)
-https://eshoptrip.com
Welcome to Cyber Security 2020:-Bners Guide to Cyber Security!
What you’ll learn
Cyber Security
Cyber Security Techniques
Types OF Hackers
Cyber Attacks
Firewall
Antivirus
Encryption
Digital Signature
Authentication
Tcp/ip Model
Computer Forensic
Password Generation
Cyber security Certifications
Requirements
Be able to use Computer & Internet
You Should be interested to learn cyber security
Description
!!
Cyber Security:Bners Guide to Cyber Security:-Learn Cyber security From very scratch and yourself from being hacked
Have you ever thought about how hackers perform cyber attacks? how they able to break into security? Do you want to learn different aspects of cybersecurity? about Certification? what are the different kinds of attacks that can be performed on any network? if YES Than this course for you, we will be starting from the bning and cover each and every aspect of cybersecurity/information security.
This course is the perfect choice if you don’t know anything about cybersecurity and want to pursue a career in Cybersecurity.
Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security twice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security.
Section 1:-This section in all about the introduction of the cybersecurity.
Introduction
Section 2:-In this section we will be learning about the CIA trait, What is CIA trait? and what are the components of the CIA trait.
CIA trait
Confidentiality
Integrity
Availability
Section 3:-This section contains the types of attacks that are being performed by the hacker in today’s world. This section will help you to understand what are the types of attacks that are being performed by hackers in today’s world.
Cyberc
Insider attack
External attack
Section 4:-This section will get you into the world of hacking and hackers because in this section we will be going to learn about the hacking and the types of hackers present in our world.
Hacking
Black Hat Hacker
White Hat Hacker
Gray Hat Hacker
Section 5:-This is will teach you what is malware and what are the types of malware. This section is very important to understand because in today’s world most of the black hat attacks are performed using malware so understanding malware is very important.
Malware
Spyware
Adware
Browser Hijacking
Computer Virus
Computer worm
Trojan Horse
Section 6:-Cyber c is the dark side of the cybersecurity.c that involves a computer and a network. The computer may have been used in the commission of a c, or it may be the target. Cyberc may threaten a person or a nation’s security and financial health.
Cyberc
Cyberstalking
software piracy
Phishing
Computer hacking
spreading virus
spamming
web jacking
salami attack
Section 7:-This section is very important if you want to understand what are the different types of cyberattacks. A cyber attack is an assault launched by cybercriminals using one or more computers against single or multiple computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.
Threat Landscape
Structural attack
DDOS
MITM
Social eeering
Botnet
Cross-site scripting
SQL injection
Section 8:-This section will teach you how to protect yourself from being hacked. This section will introduce you from different aspects of securing yourself.
Authentication
Encryption
Digital Signature
Section 9:-This section is all about the antivirus and about its working.
Antivirus
Working
Section10:-This Section will cover TCP/IP model. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model.
TCP/IP model
Physical layer
Datalink layer
Network layer
Transport layer
Application layer
Section 11:-This Section contains the topic Firewall. A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predeteed security rules.
Firewall
Types
packet filtering
Next-generation Firewall
Circuit level firewall
stateful firewall
software firewall
proxy firewall
Hardware firewall
Section 12:-This section will provide information about Computer forensics.Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
Computer Forensic
Working
Section 13:-Password is the only legal way to get into the account. In this section, we will learn about how to generate password.
Secure Password Generation
Section 14:-This is the last section of this course in this section we sill going to learn about the different types of certification that a user can take to boost their career in cybersecurity.
Certification
CEH certification
CompTIA Security +
CISSP certification
Conclusion
Who this course is for:
Anyone interested in learning Cybersecurity.
Anyone interested in becoming a Cybersecurity expert.
Anybody interested in learning how to secure yourself from hackers.
Who this course is for:
Ethical hacker
cyber security
programmer
coder
penetration testor
hacker
Reviews
There are no reviews yet.