Cyber Security - Go From Zero to Hero in 9 Hours
4.6 (670 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
24,059 students enrolled

Cyber Security - Go From Zero to Hero in 9 Hours

Learn entire Networking, Cyber Security, Attacks, Cryptography, Security Audits, Hacking, Web Application in Part 1!
New
4.6 (670 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
24,059 students enrolled
Last updated 5/2020
English
English [Auto-generated]
Current price: $11.99 Original price: $19.99 Discount: 40% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8.5 hours on-demand video
  • 11 articles
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Become Expert in Computer Networking
  • Entire networking related to Cyber security and Terminologies - Threat, Vulnerability, Incident, Management, Attacks, Exploits, Events
  • Fundamentals of Cybersecurity that will help students to dive in this field and Different Types of Attacks and world famous cyber attack examples
  • Careers and job opportunities in Cyber security
  • Roles in Cybersecurity - CISO, CISM, CISA, Penetration Tester, Incident Response Teams
  • Fundamentals of Cryptography
  • Learn about different Cyber security organizations - NIST, NSA, SANS Institute, OWASP, CISCO
  • A brief overview of malware and its types
  • Overview of Security Audits and Frameworks
  • Self Evaluation through quizzes
Requirements
  • IMPORTANT - You should be enthusiastic to learn Cyber Security
  • Be able to understand English
  • Basic knowledge of Computers
  • Rest everything leave it to us, we will take you from novice to expert!
Description

-------------  FIRST SEE THE REVIEWS & RATINGS THEN PROCEED TO CHECKOUT :)  ----------------

The field of technology is growing exponentially with the IT sector flourishing every day. Amidst such growth of the industry and increased concern for privacy, the demand for security is rising. Cybersecurity has become an everyday struggle for many businesses. Recent trends and statistics reveal that there is a huge increase in hacked and breached data from very common sources at workplaces. So go for this course to get a better understanding of cyber security!

Most of the people are often confused when they are asked - “WHAT IS CYBER SECURITY?” The most common reply is - “UM, HACKING. ” Well, hacking is part of cyber security but it doesn’t mean that hacking is the synonym of cyber security. Many courses out there only teach how to use the tool but the reasoning that goes behind its selection is not taught. Also, the main focus of these courses is on hacking but it is not the only domain in cyber security. Other major domains are Incident Response Management, Blue team, Security Audits, IT Security Management, Security laws and many more.

---------------------------------------------------------------------------------------------------------------------------------------------------

" I was doubting on this course as this was a new one on Udemy . But getting started with the course gave me a good insight of Cyber Security and all my concepts were cleared about Computer Networking in the first section itself. No course based on Cyber Security includes Networking but this course has covered the same so I preferred this course. "  ~ Sonia Sharma

----------------------------------------------------------------------------------------------------------------------------------------------------

Well University of Maryland, United States, says,

Hackers attack every 39 seconds, on average 2,244 times a day.

So are you sure that your data is well protected from these hackers? Have you even configured your network to control your privacy? Do you know how hackers can access your devices without your knowledge?? Well, don’t worry! We are here to answer these questions. There must be many questions in your mind regarding this course. We will surely address all once you enroll for this course, but for the time being, we’ll focus on the following questions:


WHY SHOULD I LEARN CYBER SECURITY?


Let’s face it. We live in a digital world. Our work lives, personal lives, and finances have all begun gravitating toward the world of the internet, mobile computing, and electronic media. Unfortunately, this widespread phenomenon makes us more vulnerable than ever to malicious attacks, invasions of privacy, fraud, and other such frightening cases. This is why cyber security is such a vital part of a secure and well-ordered digital world. Cybersecurity keeps us safe from hackers, cyber criminals, and other agents of fraud.

But let me ask you a question,


HOW GOOD IS YOUR KNOWLEDGE ABOUT CYBER SECURITY?

--------------------------------------------------------------------------------------------------------------------------------------------------------------

" This course is very useful for learning the basics of cyber security. I was not familiar with the terms at first but after opting for learning something new I learned new terms. The instructors are very helpful and they make us understand the concepts in ease and the explanation provided by them is very quick to grasp. So thank you for sharing this amazing course." ~ Madhura Risbud

----------------------------------------------------------------------------------------------------------------------------------------------------------------

Here are some facts that would blow up your mind!


1. According to Varonis, Worldwide spending on cyber security is forecasted to reach  $133.7 billion in 2022.

2. Data breaches exposed 4.1 billion records in the first half of 2019.

3. Symantec says, the top malicious email attachment types are .doc and .dot which makes up 37%, the next highest is .exe at 19.5%


These are not just facts but they are warnings! Everyone who is accessing a device should be aware of their security and that is why we have designed this course. Okay, here comes the next question.


UM, OKAY! BUT WHY SHOULD I ENROLL FOR THIS COURSE?


The perfect answer to this question would be - Have a look at our curriculum. Cyber Security - Zero to Hero in 9 Hours is the first part of our CYBER SECURITY SPECIALIZATION. In this course, we have covered from the basics of the computer to networking right up to advanced concepts such as cryptography, security auditing, incident management. Yes, we have started right from the definition of a Computer Network. Our course is broadly divided into seven sections. In the first section, we will cover the basics of networking. We will discuss the various protocols and their usage. We will talk about IP addresses and their classes and cover many important points in the field of cyber security.


Bonus Material -We have also included interesting practicals !!


In the second section, we dive into cyber security. We discuss right from the history of cyber security to different trending terminologies. We have specially designed the curriculum to make sure even a novice student can understand the concepts. The course will help you develop critical thinking needed to pursue a career in Cyber security. You will also get to know about organizations and resources which provide assistance and framework in this field. We recommend you to watch our introductory video where we have discussed the entire syllabus :) Have a look at the few features of our course.



1. Handpicked curriculum, specially designed for all levels of learners.

2. Continuous assessment through challenging quizzes.

3. Get your questions answered within 48 hours.

4. A variety of resources such as useful links, books, PDFs are also provided.

5. Regular updates made to the curriculum.

6. Different aspects of Cybersecurity explored.

7. Practicals with explanation included.

8. Understand how cryptography works in real life.

9. Real-life examples such as firewalls, antivirus, cyber-attacks are also discussed and much more.

Suggestions are always welcome :)


● WHO CAN ENROLL FOR THIS COURSE?

This course is not intended for a specific group of people. Anyone who wants to learn about cyber security can enroll for this course. If you already know a few concepts, you can always revisit the ideas and clear. We have covered statistics along with technical topics. In short, this is a perfect course for you if you want to kick start your career in cyber security!


BOTTOM LINE -

Once you move ahead in this course, you will get a clear idea about what cyber security is. We have assembled this course in a way that you will enjoy and learn along the way.

Who this course is for:
  • Cyber security enthusiasts
  • Those who are looking for a perfect start in Cyber Security
  • Those who are looking to change their field to Information Technology
  • Those who are wondering what is Cyber security
Course content
Expand all 112 lectures 08:25:25
+ BASICS OF NETWORKING
31 lectures 02:14:18
Network Topologies
08:40
History and Applications of Computer Networking
05:31
Protocols and Standards
06:40
BASICS OF NETWORKING Quiz 1
00:24
The OSI Reference Model
07:58
The TCP/IP Model
07:47
BASICS OF NETWORKING Quiz 2
00:22
Addressing in Computer Networks
12:19
IP Address and IP Address Spoofing
06:51
PRACTICAL : USING PING COMMAND PART 1
03:01
Classes of IP Address
08:44
PRACTICAL : USING PING COMMAND PART 2
03:34
The Internet Protocol (IP)
06:20
PRACTICAL : HOW TO FIND OUT YOUR PC's IP & MAC ADDRESS
02:26
BASICS OF NETWORKING Quiz 3
00:21
Address Resolution Protocol (ARP)
03:51
Dynamic Host Configuration Protocol (DHCP)
04:47
Internet Control Message Protocol (ICMP)
01:34
RIP, OSPF and BGP Protocols
05:37
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT
02:16
File Transfer Protocol (FTP)
03:53
Domain Name System (DNS)
02:48
What are Sockets?
06:23
Hypertext Transfer Protocol (HTTP)
04:19
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS)
04:58
BASICS OF NETWORKING Quiz 4
00:19
Conclusion
00:37
+ GETTING STARTED WITH CYBER SECURITY
9 lectures 37:20
Introduction
01:01
Definition of Computer Security
03:03
Need of Cyber Security
04:16
Interesting Facts about Cyber Security
04:58
History of Cyber Security
07:01
Career and Jobs in Cyber Security
07:50
GETTING STARTED WITH CYBER SECURITY QUIZ
00:22
Conclusion
00:31
+ LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY
11 lectures 49:11
Introduction
01:09
Standard Definition of Cyber Security
02:37
Types of Computer Security
02:38
Key Terms in Cyber Security
06:35
The Elements of Information Security
05:56
Types of Attacks
10:22
Roles in Cyber Security : Part 1
08:11
Roles in Cyber Security : Part 2
05:40
PRACTICAL : USING OSINT FRAMEWORK FOR INFORMATION GATHERING
05:02
SECTION 3 QUIZ
00:22
Conclusion
00:39
+ DIVING DEEP INTO CYBER SECURITY
19 lectures 01:17:57
Introduction
01:19
Security Architect's View of Security
08:09
What is Vulnerability Assessment?
04:34
4 Phases of Vulnerability Assessment
08:55
PRACTICAL : DOWNLOADING NESSUS VULNERABILITY SCANNER
01:28
PRACTICAL : CREATING A ADVANCE NETWORK SCAN POLICY
05:35
PRACTICAL : INITIATING A SCAN USING USER DEFINED POLICIES
03:22
PRACTICAL : GOING THROUGH SCANNED RESULTS
02:57
Introduction to Cryptography
05:43
Symmetric Encryption
02:44
Asymmetric Encryption
04:03
Hashing
07:12
Security Organizations
05:02
Critical Thinking in Cyber Security
03:35
The Five Critical Thinking Skills
05:39
PRACTICAL : USING NSLOOKUP TOOL
02:51
PRACTICAL : USING NETSTAT TOOL
03:57
SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY
00:22
Conclusion
00:30
+ TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES
17 lectures 01:34:45
Introduction
00:52
Types of Cyber Attacks
04:03
Hacking Organizations around the Globe
04:53
Security Services and Mechanisms
03:15
Introduction to Threats
03:11
What is a Malware?
07:02
Everything about Trojans
05:48
Oh My God, It's the VIRUS!
06:41
Have you ever heard about a Ransomware?
09:25
PRACTICAL : INFORMATION GATHERING USING SHODAN
08:50
The Cyber Kill Chain
08:35
Introduction to Social Engineering
04:45
Types of Social Engineering
06:50
PRACTICAL : HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING
09:52
SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE
00:22
Conclusion
00:35
+ KEY SECURITY CONCEPTS
14 lectures 01:06:01
Introduction
01:09
Confidentiality - The Most Important Element of Security
04:13
Integrity, Authentication, Access Control and Non-Repudiation
08:23
Introduction to Incident Response Team
05:21
Phases of Incident Response
05:04
Laws in Cyber Security
05:15
What are Audits in Cyber Security
09:21
Internal Audit vs External Audit
04:19
How to carry out an Internal Audit?
10:18
The NIST Framework
03:21
The COBIT Framework
03:46
Other Security Frameworks
04:31
SECTION 6 QUIZ - KEY SECURITY CONCEPTS
00:22
Conclusion
00:38
+ FIREWALLS AND ANTIVIRUS
11 lectures 45:50
Introduction
01:06
Intrusion Detection System
05:22
Introduction to Firewalls
04:34
Firewall Architecture
05:39
What is DMZ?
03:51
Different types of Firewalls
08:59
The Antivirus!
03:03
Antivirus Detection Techniques
09:26
Firewalls vs Antivirus
01:39
THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS
00:30
CONGRATULATIONS!
01:41