Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React CSS Angular Node.Js PHP HTML5 Typescript
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA CompTIA Security+ Microsoft AZ-900
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Data Analysis
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Mobile Game Development
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin Mobile App Development SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Personal Development Neuro-Linguistic Programming Personal Transformation Life Purpose Mindfulness Sound Therapy Coaching CBT Cognitive Behavioral Therapy
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Leadership
Digital Marketing Social Media Marketing Marketing Strategy Google Analytics Internet Marketing Copywriting Email Marketing Startup YouTube Marketing
2022-07-04T05:25:02Z

IT & SoftwareNetwork & SecurityCyber Security

Certified Basic Cyber Security Expert 2022

Learn The Most Required Cyber Security Skill To Secure Your Organization
Rating: 4.0 out of 54.0 (77 ratings)
4,209 students
Created by Sourabh Aggarwal
Last updated 12/2017
English

What you'll learn

  • Will be able to understand the basics of cyber security.
  • They will further learn how to deal with cyber security issues.
  • Will come to know about recent developments that have taken place in this area.
  • Will be able to do basic security on the internet and computers.

Requirements

  • You should know how to work on computers.
  • Basic knowledge of Internet.
  • Student should have interest in the subject of Cyber Security.

Description

Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cyber security training teaches professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.

We depend on technology heavily, which also translates to a rise in online hackers. The bigger the corporation is, the higher the risk of cyber attacks. This is when cyber security comes into the picture.

What is cyber security: Cyber security is the condition of being guarded against criminal and illegal activities that comprise of activities related to computer, information technology, and virtual reality. It also means the measures taken to acquire this condition. One must know the risks, threats, and consequences of cyber attacks.

- Who are the attackers: The attacker could be an external source like a hacker who gets into the system and steals files. The imposter could even be someone from the company itself, like an employee who has an access to confidential information.

- How are the attacks carried out: The attackers through viruses or botnets invade systems. It is even done by using a USB drive or clicking on an unknown link.

- When is the attack carried out: Cyber attacks mostly occur when your systems or the internal staff are vulnerable. There is no specific vulnerability and the attack can occur at any time.

- Which area is hit: Cyberspace is a limitless stretch so the attack can occur in any area.

- Why do these attacks occur: The external agents strike to leak or held captive crucial company data for earning ransom. And the internal sources like the employees do it for competitors in exchange for money. Some even do it as a revenge due to past unpleasant experiences.

- How to tackle cyber attacks: There are three ways of securing your website:

1) SSL Certificate: This certificate validates your website's identity and encrypts the information visitors send or receive from your site.

2) CodeGuard: It is a service that does an automatic backup of your website.

3) SiteLock: It scans your website for any threat and when it is detected, it works effectively to repair it. Also, you would be instantly notified about any attack.

It is protecting CIA:

  • Confidentiality
  • Integrity
  • Availability

This is typically done using a risk based approach where the risk is the expected impact of a breach combined with the likelihood that a breach will occur. The likelihood is given by the combination of a vulnerability and an attacker (or threat).

Cybersecurity protects individuals and organizations from cyberattacks. Here are some solutions, including both technical and human components:

Real-time Intelligence: Real-time intelligence is a powerful tool for preventing and containing cyber attacks. The longer it takes to identify a hack, the more costly its consequences. With just 60 seconds’ notification of a compromise, resulting costs could be reduced by 40%.

Complementary Actions:

  • Enacting a multi-layered defense strategy. Ensure that it covers your entire enterprise, all endpoints, mobile devices, applications, and data.
  • Third-party assessments. Implement a “least privilege” policy regarding who and what others can access. Make it a habit to review the use of credentials with third parties. You could even take it a step further with a service level agreement (SLA).
  • Continuously backing-up data. This can help to safeguard against ransomware, which freezes computer files until the victim meets the monetary demands.
  • Patching frequently. A software patch is a code update in existing software. It can fix a bug, address new security vulnerability, address software stability issues, or install new drivers.
  • Whitelisting software applications. Application whitelisting would prevent computers from installing non-approved software. This allows administrators to have much more control.

Cyber-insurance scope varies across providers, but typically protects against security breaches and losses. Insurers typically limit their capacity to between $5 million and $100 million per client. The overall cyber-insurance market is estimated to be $20 billion by 2025, up from $3.25 billion today.

Human/Cultural Components:

  • For many CEOs and CFOs, hacking can be frustrating because they don’t understand the enemy. A Deloitte white paper suggests creating a dedicated cyber threat management team. It is also recommended that organizations designate a chief information security officer (CISO). For example, neither JPMorgan nor Target had CISOs when they were breached in 2014 and 2013, respectively.
  • Back to basics: Employee training. Data breaches are often the result of humans’ psychological weaknesses. It’s critical to educate your employees about the warning signs of security breaches, safe practices, and how to respond to a suspected takeover.

What will you learn in this course?

1. Basics of Cyber Security

2. Common Threats

3. National and International Actions

4. Principles of Cyber Security

5. Elements of Cyber Security

6. Certifications

7. Job Market

8. Cyber Kill Chain

9. Legal Issues and Global Reguation

10. Role of Government

Who this course is for:

  • Students above 9 yrs of age.
  • Computer Science Professionals.
  • Information Technology Professionals.
  • Employees of organisations.
  • Corporates, Chief Information Officer, Chief Information Security Officer and Chief Financial Officer
  • National Security Advisor
  • Software Engineers
  • Website Developers
  • Entrepreneurs

Instructor

Sourabh Aggarwal
Software Engineer►Web Developer★Cyber Security♛Speaker
Sourabh Aggarwal
  • 3.8 Instructor Rating
  • 175 Reviews
  • 9,474 Students
  • 2 Courses

I am a huge people-person and spent several years in Software & Web Development, Branding and Product Management, but a few years ago a serendipitous event inspired me to get into Cyber Security, and I love it! There is nothing greater than finding Vulnerabilities and Malware for smart companies and individuals to do awesome things, and it's a fantastic process that I feel lucky to integrate my IT skills with cyber security.

The trajectory of my career has been driven by a strong work ethic, persistence in the face of challenges, and my ability to learn quickly in fast-paced environments. I am proud to be known as a “go-to” type of professional when a problem needs to be solved, and I’m looking forward to growing in expertise in emerging tech tools in Cyber Security & IT Services.

I love meeting new people and learning new things, so please feel free to say hello and share a story with me. I am thrilled, and truly blessed to be a part of the amazing people around me! ☕

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.