HOME > IT & Software > The Cyber Security Series- Introduction to Cyber Security

The Cyber Security Series- Introduction to Cyber Security

SynopsisThe Cyber Security Series: Introduction to Cyber Security, av...
The Cyber Security Series- Introduction to  No.1

The Cyber Security Series: Introduction to Cyber Security, available at Free, has an average rating of 4.6, with 30 lectures, 1 quizzes, based on 156 reviews, and has 6702 subscribers.

Free Enroll Now

You will learn about Meaning of Cyber Security Difference Between Cyber Security and Information Security Privacy and Anonymity Terminologies in Cyber Security Meaning of Hacking Types of Hackers Web Application Security Staying Safe from Cyber Attacks This course is ideal for individuals who are This course is for anyone who wants to get started in cyber security. It is particularly useful for This course is for anyone who wants to get started in cyber security.

Enroll now: The Cyber Security Series: Introduction to Cyber Security

Summary

Title: The Cyber Security Series: Introduction to Cyber Security

Price: Free

Average Rating: 4.6

Number of Lectures: 30

Number of Quizzes: 1

Number of Published Lectures: 30

Number of Published Quizzes: 1

Number of Curriculum Items: 31

Number of Published Curriculum Objects: 31

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Meaning of Cyber Security
  • Difference Between Cyber Security and Information Security
  • Privacy and Anonymity
  • Terminologies in Cyber Security
  • Meaning of Hacking
  • Types of Hackers
  • Web Application Security
  • Staying Safe from Cyber Attacks
  • Who Should Attend

  • This course is for anyone who wants to get started in cyber security.
  • Target Audiences

  • This course is for anyone who wants to get started in cyber security.
  • “To catch a thief you need to think like one”“And to catch a Hacker you also need to think like one”. The Cyber Security Field is a very fast growing area. For every cyber attack that occurs new security policies and defense mechanisms are put in place and for every new defense mechanisms,  new types of cyber attacks emerge. So it is a continuous loop of hackers getting smarter and cyber security professionals also getting smarter. It is important that we keep our selves up to date on the latest news and information on cyber security. This course provides your with a brief but detailed information that you’ll need to understand when learning cyber security. And this course also covers some aspects hacking and ethical hacking. It also covers a few terms and terminologies associated with hacking. Cyber Security happens to be the most talked about topic world wide. It is important that we try as much as possible to learn new ways we can protect our selves from any type of cyber attack. By the end of this course you’ll learn about,

  • Cyber Security & Information Security

  • Vulnerabilities

  • Privacy and Anonymity

  • Hacking and Hackers

  • How Hackers Hack

  • Web Application Security and Vulnerabilities

  • Denial of Service and Distributed Denial of Service

  • Security Threats

  • Terminologies in Cyber Security

  • Staying Safe

  • Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Welcome and Learning Objectives.

    Lecture 2: Updates

    Chapter 2: Cyber Security

    Lecture 1: What is Cyber Security?

    Lecture 2: Difference Between Cyber Security and Information Security

    Lecture 3: Importance of Cyber Security

    Lecture 4: The CIA Triad

    Lecture 5: Privacy and Anonymity

    Lecture 6: Staying Private Online

    Lecture 7: Staying Anonymous Online

    Lecture 8: Security Threats

    Lecture 9: Terminologies

    Chapter 3: Hacking

    Lecture 1: What is Hacking and Ethical Hacking

    Lecture 2: Types of Hackers

    Lecture 3: How Hackers Hack

    Lecture 4: Footprinting/Reconnaissance

    Lecture 5: Scanning and Enumeration

    Lecture 6: Gaining Access, Maintaining Access, and Covering Tracks

    Lecture 7: Staying Safe From Cyber Attacks

    Chapter 4: Web Application Security

    Lecture 1: What a website is and How it works

    Lecture 2: Web Application Hacking and Vulnerabilities

    Lecture 3: Cross Site Scripting (XSS)

    Lecture 4: Types of XSS

    Lecture 5: SQL Injection 1

    Lecture 6: SQL Injection 2 (Types)

    Lecture 7: Parameter Tampering

    Lecture 8: Information Disclosure

    Lecture 9: DOS and DDOS

    Lecture 10: Authentication Bypass

    Chapter 5: Additional Content

    Lecture 1: Passwords

    Lecture 2: OSINT

    Instructors

  • The Cyber Security Series- Introduction to  No.2
    Abdurraheem Abdulfattah
    Instructor
  • Rating Distribution

  • 1 stars: 6 votes
  • 2 stars: 8 votes
  • 3 stars: 38 votes
  • 4 stars: 38 votes
  • 5 stars: 66 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!