Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security for Absolute Beginners: Essential Concepts
Section 1: Course Introduction
Welcome to the Course! (3:16)
Why Learn Cyber Security from Me? (2:26)
Course Companion Study Guide (0:45)
Course Case Studies Overview (0:52)
Join our Facebook Student Community
Student Exercise: Introduce Yourself
Introduction to Cyber Security
Section Introduction (0:29)
What is Cyber Security? (2:48)
Why Do We Need Cyber Security? (4:41)
The Current State of Cybersecurity in 2021 & 2022 (6:27)
Understanding Hackers
Section Introduction (0:35)
What Hacking Isn’t (1:55)
Types of Hackers (2:17)
Hacker Motivations (3:28)
The Hacking Methodology (6:44)
Networking 101
Section Introduction (0:55)
What is a Computer Network? (1:51)
Some Basic Networking Rules (1:51)
Computer Protocols (2:40)
LANs versus WANs (3:22)
MAC versus IP Addresses (3:04)
Switches versus Routers (4:50)
TCP/IP Protocol Suite (3:32)
How the Internet Works (Simplified) (3:54)
Student Exercise 2: Identifying your MAC and IP Address (Windows and Mac OS) (3:47)
Malware Threats
Section Introduction (0:22)
Viruses and Worms (3:35)
Trojan Horses and Logic Bombs (3:02)
Spyware and Adware (2:25)
Ransomware and Rootkits (3:54)
How Hackers Deploy Malware (3:12)
Case Study: Colonial Pipeline
Additional Threats & Vulnerabilities
Section Introduction (0:27)
Zero-Day Attacks (2:30)
Buffer Overflows (4:01)
Protocol Spoofing (6:32)
DoS and DDoS Attacks (2:48)
Weak Encryption & Software Vulnerability Attacks (3:27)
Web-Based Attacks (4:39)
Evil Twin and Rogue Access Points (4:26)
Case Study: TJX Companies Inc. (TJX)
Social Engineering & Email Based Threats
Section Introduction (0:27)
Social Engineering Attacks (3:55)
Social Engineering Scenarios Overview (1:14)
Social Engineering Phone Call Example #1 (1:21)
Social Engineering Phone Call Example #2 (1:37)
Email Spam, Spoofing, Phishing, and Pharming (7:43)
Core Cyber Security Principles
Section Introduction (0:36)
The CIA Triad (4:27)
Defense in Depth (1:53)
Least Privilege (3:40)
Risk Management (15:43)
Fundamental Threat Countermeasures
Section Introduction (0:37)
Multi-Factor Authentication (3:08)
Password Best Practices (4:31)
Endpoint Protection (3:54)
Encryption (5:22)
Firewalls (4:28)
Intrusion Detection & Prevention Systems (IDS/IPS) (3:48)
Utilizing a Network DMZ (3:15)
Honeypot Decoys (1:22)
Virtual Private Network (VPN) (4:11)
Wireless Networking Security (4:56)
Student Exercise #3: Exploring the Built-In Firewall (Windows and Mac OS) (5:27)
Cyber Security in the Workplace
Section Introduction (0:29)
Patch Management & Change Management (4:04)
Incident Response (5:15)
Application Development Security (5:05)
Security Assessments (3:21)
Risk Management Program (4:47)
Personnel Policies (4:04)
Training, Eduation and Awareness (4:25)
Conclusion & Next Steps
Congratulations (0:56)
Endpoint Protection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock