Course curriculum

    1. Welcome to the Course!

    2. Why Learn Cyber Security from Me?

    3. Course Companion Study Guide

    4. Course Case Studies Overview

    5. Student Exercise: Introduce Yourself

    1. Section Introduction

    2. What is Cyber Security?

    3. Why Do We Need Cyber Security?

    4. The Evolving Cybersecurity Landscape 2024

    1. Section Introduction

    2. What Hacking Isn’t

    3. Types of Hackers

    4. Hacker Motivations

    5. The Hacking Methodology

    1. Section Introduction

    2. What is a Computer Network?

    3. Some Basic Networking Rules

    4. Computer Protocols

    5. LANs versus WANs

    6. MAC versus IP Addresses

    7. Switches versus Routers

    8. TCP/IP Protocol Suite

    9. How the Internet Works (Simplified)

    10. Student Exercise: Identifying your MAC and IP Address (Windows and Mac OS)

    1. Section Introduction

    2. Viruses and Worms

    3. Trojan Horses and Logic Bombs

    4. Spyware and Adware

    5. Ransomware and Rootkits

    6. Mobile Malware

    7. How Hackers Deploy Malware

    8. Case Study #1: Colonial Pipeline

    1. Section Introduction

    2. Zero-Day Attacks

    3. Buffer Overflows

    4. Protocol Spoofing

    5. DoS and DDoS Attacks

    6. Weak Encryption & Software Vulnerability Attacks

    7. Web-Based Attacks

    8. Evil Twin and Rogue Access Points

    9. Case Study #2: TJX Companies Inc. (TJX)

About this course

  • $49.95
  • 73 lessons
  • 4 hours of video content

Discover your potential, starting today