Course curriculum
-
-
Welcome to the Course!
-
Why Learn Cyber Security from Me?
-
Course Companion Study Guide
-
Course Case Studies Overview
-
Student Exercise: Introduce Yourself
-
-
-
Section Introduction
-
What is Cyber Security?
-
Why Do We Need Cyber Security?
-
The Evolving Cybersecurity Landscape 2024
-
-
-
Section Introduction
-
What Hacking Isn’t
-
Types of Hackers
-
Hacker Motivations
-
The Hacking Methodology
-
-
-
Section Introduction
-
What is a Computer Network?
-
Some Basic Networking Rules
-
Computer Protocols
-
LANs versus WANs
-
MAC versus IP Addresses
-
Switches versus Routers
-
TCP/IP Protocol Suite
-
How the Internet Works (Simplified)
-
Student Exercise: Identifying your MAC and IP Address (Windows and Mac OS)
-
-
-
Section Introduction
-
Viruses and Worms
-
Trojan Horses and Logic Bombs
-
Spyware and Adware
-
Ransomware and Rootkits
-
Mobile Malware
-
How Hackers Deploy Malware
-
Case Study #1: Colonial Pipeline
-
-
-
Section Introduction
-
Zero-Day Attacks
-
Buffer Overflows
-
Protocol Spoofing
-
DoS and DDoS Attacks
-
Weak Encryption & Software Vulnerability Attacks
-
Web-Based Attacks
-
Evil Twin and Rogue Access Points
-
Case Study #2: TJX Companies Inc. (TJX)
-
About this course
- $49.95
- 73 lessons
- 4 hours of video content