The Absolute Beginners Guide to Cyber Security 2020 - Part 1
4.6 (11,466 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
28,434 students enrolled

The Absolute Beginners Guide to Cyber Security 2020 - Part 1

Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more
4.6 (11,466 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
28,434 students enrolled
Created by Alexander Oni
Last updated 5/2020
English
English [Auto], German [Auto], 2 more
  • Italian [Auto]
  • Polish [Auto]
Current price: $69.99 Original price: $99.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 4 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand the basic concepts and terminologies used in the information and cyber security fields
  • Take up entry roles for IT and Cybersecurity Positions
  • Differentiate between the various forms of malware and how they affect computers and networks
  • Understand how hackers actually hack
Requirements
  • You should know how to use a computer
  • You should know how to use the internet
Description

** PART 1 OF THE BEST SELLING CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.

This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.

** UDEMY BEST SELLING COURSE **

Over 4000 happy students have enrolled in this best seller course which has an average rating of 4.5 due to stellar reviews.

'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.'  - E. Wolfe

"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples." - Chris Loyola

PERFECT FOR COMPLETE BEGINNERS

This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security. 

Course Curriculum

In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.

In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.

Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as 

  • Phishing

  • Brute Force Attack

  • DoS & DDoS Attacks

  • Bots and Botnets

  • and much more

We will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.

In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work

  • Antivirus

  • Firewalls

  • Encryption

  • Biometrics

  • Authentication Methods

  • and much more

Finally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.

By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional. 

What are you waiting for??? Enroll in this best selling course today.

Alex.

Who this course is for:
  • Students who want to learn the basics of computer and cyber security
  • Students who want to become IT or Cyber Security Experts
Course content
Expand all 55 lectures 03:36:12
+ General Introduction to IT & Cyber Security
9 lectures 25:15
Connect with Me
03:46
Udemy Rating System - Very Important !!!
01:24
Basic Terminologies
01:10
Computer Protocols
07:04
Cookies
00:32
The TCP/IP
03:32
Section Quiz
5 questions
+ Mind of a Hacker
6 lectures 25:43
Types of Hackers
07:18
The Hacking Methodology
03:47
The WhoIS Query
05:39
Social Engineering
03:36
Section Quiz
3 questions
+ Attacks
9 lectures 37:19
Brute Force Attacks
04:17
Phishing
05:14
Phishing - Part 2
06:04
Bots and Botnets
03:27
DoS and DDoS
04:44
Pings
03:25
Man in the Middle Attacks
04:18
SQL Injections
05:01
Section Quiz
5 questions
+ Malware
6 lectures 28:05
Viruses & Worms
04:51
Trojans
07:19
Adware and Spyware
03:59
Ransomware
07:15
Other Types of Malware
03:38
Section Quiz
5 questions
+ Defences
9 lectures 38:37
Section Intro
00:42
Anti Virus
04:34
Encryption
03:07
Firewalls
04:13
Biometrics
03:14
Factor Authentication Methods
04:54
Honey Pots and DMZs
05:07
Security for Wireless Networks
02:08
Password Management
10:38
Section Quiz
5 questions
+ Information Security at the Work Place
6 lectures 17:29
BYOD Management
03:06
A Sample BYOD Policy
06:15
The Security vs Ease of Access Paradox
03:07
The Weakest Link & The Disgruntled Employee
02:02
Review Update
02:42
+ Cyber Warfare and Cyber Attacks Against Companies
4 lectures 16:56
Introduction to Cyber Warfare
02:25
The Attack Against Estonia
06:30
Stuxnet and the Attack Against Iran
04:30
The Sony Hack
03:31
+ Extras and Conclusion
6 lectures 26:47
Course Promo
04:46
Actionable Steps for Personal Security
01:36
Biggest Myths of Online Security
07:01
SPECIAL LESSON - How to Launch your Career in Cyber Security
08:36
Getting your Certificate
03:00
Conclusion
01:48