Cyber Security Series: Cyber Security

Posted By: ELK1nG

Cyber Security Series: Cyber Security
Published 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 286.65 MB | Duration: 0h 43m

Introduction to Cyber Security

What you'll learn
Meaning of Cyber Security
Difference Between Cyber Security and Information Security
Privacy and Anonymity
Terminologies in Cyber Security
Meaning of Hacking
Types of Hackers
Web Application Security
Staying Safe from Cyber Attacks
Requirements
No prior experience is required
Description
"To catch a thief you need to think like one" ,  "And to catch a Hacker you also need to think like one". The Cyber Security Field is a very fast growing area. For every cyber attack that occurs new security policies and defense mechanisms are put in place and for every new defense mechanisms,  new types of cyber attacks emerge. So it is a continuous loop of hackers getting smarter and cyber security professionals also getting smarter. It is important that we keep our selves up to date on the latest news and information on cyber security. This course provides your with a brief but detailed information that you'll need to understand when learning cyber security. And this course also covers some aspects hacking and ethical hacking. It also covers a few terms and terminologies associated with hacking. Cyber Security happens to be the most talked about topic world wide. It is important that we try as much as possible to learn new ways we can protect our selves from any type of cyber attack. By the end of this course you'll learn about,Cyber Security & Information SecurityVulnerabilitiesPrivacy and AnonymityHacking and HackersHow Hackers HackWeb Application Security and VulnerabilitiesDenial of Service and Distributed Denial of ServiceSecurity Threats Terminologies in Cyber SecurityStaying Safe

Overview

Section 1: Introduction

Lecture 1 Welcome and Learning Objectives.

Lecture 2 Updates

Section 2: Cyber Security

Lecture 3 What is Cyber Security?

Lecture 4 Difference Between Cyber Security and Information Security

Lecture 5 Importance of Cyber Security

Lecture 6 The CIA Triad

Lecture 7 Privacy and Anonymity

Lecture 8 Staying Private Online

Lecture 9 Staying Anonymous Online

Lecture 10 Security Threats

Lecture 11 Terminologies

Section 3: Hacking

Lecture 12 What is Hacking and Ethical Hacking

Lecture 13 Types of Hackers

Lecture 14 How Hackers Hack

Lecture 15 Footprinting/Reconnaissance

Lecture 16 Scanning and Enumeration

Lecture 17 Gaining Access, Maintaining Access, and Covering Tracks

Lecture 18 Staying Safe From Cyber Attacks

Section 4: Web Application Security

Lecture 19 What a website is and How it works

Lecture 20 Web Application Hacking and Vulnerabilities

Lecture 21 Cross Site Scripting (XSS)

Lecture 22 Types of XSS

Lecture 23 SQL Injection 1

Lecture 24 SQL Injection 2 (Types)

Lecture 25 Parameter Tampering

Lecture 26 Information Disclosure

Lecture 27 DOS and DDOS

Lecture 28 Authentication Bypass

Section 5: Additional Content

Lecture 29 Passwords

Lecture 30 OSINT

This course is for anyone who wants to get started in cyber security.