The Cyber Security Series: Introduction to Cyber Security



Learn Cyber Security and Hacking at a beginners level.

What you will learn

Meaning of Cyber Security

Difference Between Cyber Security and Information Security

Privacy and Anonymity

Terminologies in Cyber Security

Meaning of Hacking

Types of Hackers

Web Application Security

Staying Safe from Cyber Attacks

Description

“To catch a thief you need to think like one” “And to catch a Hacker you also need to think like one”. The Cyber Security Field is a very fast growing area. For every cyber attack that occurs new security policies and defense mechanisms are put in place and for every new defense mechanisms,  new types of cyber attacks emerge. So it is a continuous loop of hackers getting smarter and cyber security professionals also getting smarter. It is important that we keep our selves up to date on the latest news and information on cyber security. This course provides your with a brief but detailed information that you’ll need to understand when learning cyber security. And this course also covers some aspects hacking and ethical hacking. It also covers a few terms and terminologies associated with hacking. Cyber Security happens to be the most talked about topic world wide. It is important that we try as much as possible to learn new ways we can protect our selves from any type of cyber attack. By the end of this course you’ll learn about,

‘;
}});



  • Cyber Security & Information Security
  • Vulnerabilities
  • Privacy and Anonymity
  • Hacking and Hackers
  • How Hackers Hack
  • Web Application Security and Vulnerabilities
  • Denial of Service and Distributed Denial of Service
  • Security Threats
  • Terminologies in Cyber Security
  • Staying Safe

Introduction

Welcome and Learning Objectives.
Updates

Cyber Security

What is Cyber Security?
Difference Between Cyber Security and Information Security
Importance of Cyber Security
The CIA Triad
Privacy and Anonymity
Staying Private Online
Staying Anonymous Online
Security Threats
Terminologies

Hacking

What is Hacking and Ethical Hacking
Types of Hackers
How Hackers Hack
Footprinting/Reconnaissance
Scanning and Enumeration
Gaining Access, Maintaining Access, and Covering Tracks
Staying Safe From Cyber Attacks

Web Application Security

What a website is and How it works
Web Application Hacking and Vulnerabilities
Cross Site Scripting (XSS)
Types of XSS
SQL Injection 1
SQL Injection 2 (Types)
Parameter Tampering
Information Disclosure
DOS and DDOS
Authentication Bypass

Additional Content

Passwords
OSINT

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock

Check Today's 30+ Free Courses on Telegram!

X