Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Introduction to Cyber Security

    Posted By: lucky_aut
    Introduction to Cyber Security

    Introduction to Cyber Security
    Published 3/2024
    Duration: 3h30m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 838 MB
    Genre: eLearning | Language: English

    Learn the basics of Cyber Security, including Phishing, Malware and Vulnerabilities.


    What you'll learn
    The basic principles of Cyber Security
    Social Engineering Techniques
    Malicious Attack Indicators
    Wireless Network Attack Indicators
    Threat Actors and Vectors
    Vulnerability Concerns
    Security Assessment Techniques
    Penetration Testing Objectives

    Requirements
    No prior cyber security experience required.
    IT background good to have but also not required.

    Description
    This course provides an introduction to Cyber Security fundamentals. It covers essential concepts such as the CIA triad, AAA framework, Social Engineering Techniques, Malicious Attack Indicators, Wireless Network Attack Indicators, Threat Actors and Vectors, Vulnerability Concerns, Security Assessment Techniques, and Penetration Testing Objectives. These topics serve as a foundation for understanding Cyber Security and initiating a career in this field. This course does not require a previous Cyber Security background, however some IT knowledge would help. Most of the topics covered in this course are also outlined on the CompTIA Security+ SYS 601 Exam Objectives.
    Section 2 - Founding Principles
    Founding Principles
    Section 3 - Social Engineering Techniques
    Social Engineering
    Section 4 - Malicious Attack Indicators
    Malware
    Password Attacks
    Malicious Attacks
    Cloud vs On-Premise Attacks
    Section 5 - Wireless Network Attack Indicators
    Wireless Network Attacks - Wireless Attacks
    Layer 2 Network Attacks
    DNS/DoS Attacks
    Section 6 - Threat Actors and Vectors
    Threat Actors and Vectors
    Section 7 - Vulnerability Concerns
    Cloud vs On-Premise Vulnerability Concerns
    Day to Day Vulnerability Concerns
    Vendor and 3rd Party Vulnerability Concerns
    Breach Impacts
    Section 8 - Security Assessment Techniques
    Security Assessment Techniques
    Section 9 - Penetration Testing Objectives
    Penetration Testing
    Each section will end with a quiz to test your knowledge, and some labs will included throughout the course.
    Thank you so much for taking this course, and looking forward to seeing you at the end!
    Who this course is for:
    Those looking to start their Cyber Security pathway.
    Those looking to break into Cyber Security as a career.

    More Info