2021 Beginners Guide To Cyber Security

Learn from first line experts what is Cyber Security, the latest threats and how to protect against them. #2022

Last updated 2022-01-10 | 4.5

- What is Cybersecurity
- What are Threats & Vulnerabilities
- Malware - Viruses
- Worms
- Trojans
- Bots
- Adware
- Spyware
- Rootkits
- Ransomware

What you'll learn

What is Cybersecurity
What are Threats & Vulnerabilities
Malware - Viruses
Worms
Trojans
Bots
Adware
Spyware
Rootkits
Ransomware
What is Phishing
What is a brute force and denial of service attack
How to protect your data and devices

* Requirements

* None

Description

Why should you enroll?

Since we've been working in this field for over 15 years, we wanted to share part of what we've learned in all these years with people that are completely new to Cyber Security, or people that would like to understand the 2022 basics in this field.
You will find the general information mixed with real-life scenarios and real tips & tricks on how to protect from different threats.
Our goal is to use your time in the most efficient way, in order for you to get the most important content in the shortest time.

What will you know after taking our course?


1. A general introduction to Cyber Security, including an explanation of the CIA (Confidentiality, integrity, and availability) rating.
2. What is Malware (Viruses, Worms, Trojans, Bots, Adware, Spyware, Rootkits, and Ransomware).
3. Understanding different threats (Brute force, DDoS, Phishing, and Social engineering).
4. Guide on how do you protect yourself as an individual. This area will be focused on your devices and your data.
5. Bonus lecture: How are the jobs in Cyber Security? Should you consider this field?

Prerequisites

This course is designed for a general audience. No prior knowledge is required.
For different specific terms, you will have an explanation in the notes.

Who this course is for:

  • General audience

Course content

5 sections • 20 lectures

Introduction Preview 01:22

Welcome to our "2021 Beginner's guide to Cyber Security" course! 
------------------

Why should you enroll?

Since we've been working in this field for over 15 years, we wanted to share part of what we've learned in all these years with people that are completely new to Cyber Security, or people that would like to understand the 2021 basics in this field.
You will find the general information mixed with real-life scenarios and real tips & tricks on how to protect from different threats.
Our goal is to use your time in the most efficient way, in order for you to get the most important content in the shortest time.

What will you know after taking our course?


1. A general introduction to Cyber Security, including an explanation of the CIA (Confidentiality, integrity and availability) rating.
2. What is Malware (Viruses, Worms, Trojans, Bots, Adware, Spyware, Rootkits, and Ransomware).
3. Understanding different threats (Brute force, DDoS, Phishing, and Social engineering).
4. Guide on how do you protect yourself as an individual. This area will be focused on your devices and your data.
5. Bonus lecture: How are the jobs in Cyber Security? Should you consider this field?

Prerequisites

This course is designed for a general audience. No prior knowledge is required.
For different specific terms, you will have an explanation in the notes.

Introduction General definitions Preview 00:26

Introduction General Definitions - In this Chapter you will learn more about what is Cybersecurity, Infosec, Asset, Vulnerability, Threat, IT Risk.

General definitions Preview 10:58

General Definitions - in this lesson you will learn more about what is Cybersecurity, Infosec, Asset, Vulnerability, Threat, IT Risk.

Introduction to CIA model Preview 00:25

Introduction to CIA Model - Confidentiality, integrity, and availability. This is also known as the CIA triad, and it is a model designed to guide policies for information security within an enterprise/organization.

CIA model Preview 09:57

CIA Model lesson - Confidentiality, integrity, and availability. This is also known as the CIA triad, and it is a model designed to guide policies for information security within an enterprise/organization.

Quiz

Introduction to Malware Preview 00:37

Introduction to Malware (Viruses, Worms, Trojans, Bots, Ransomware, Adware, Spyware and Rootkit)

Malware (Viruses, Worms, Trojans, Bots, Ransomware, Adware, Spyware and Rootkit) Preview 22:46

Malware Lecture - In this lesson you will learn what Malware is and then we will dive into different types of malware like Viruses, Worms, Trojans, Bots, Ransomware, Adware, Spyware and Rootkits. We will also show a unique matrix that will make you understand the difference and similarities between these different types of malware.

Introduction to DoS & DDoS Preview 00:22

Introduction to DoS (Denial-of-service attack) and DDoS (Distributed Denial-of-service attack)

DoS & DDoS Preview 05:02

DoS (Denial-of-service attack) and DDoS (Distributed Denial-of-service attack) lecture - in this lesson we will explain what a DoS and DDoS are and we will show you some real-life examples.

Introduction to Brute force Preview 00:27

Introduction to Brute Force Attacks

Brute Force Preview 04:54

Brute Force Attacks lecture - in this lesson you will learn what a brute force attack is, what different types of attacks are out there and we will further investigate how secure your passwords really are and what are the tips & tricks that can help you improve this area.

Introduction to Phishing Preview 00:27

Introduction to Phishing

Phishing Preview 09:53

Phishing Lecture - we will start this lesson with a general explanation of the phishing area, explore and analyze the different types and show how you can protect yourself by having a look at common features of phishing. Finally, we will test our knowledge with an example phishing email.

Quiz

Introduction Preview 00:46

Introduction on "How you can protect yourself"

How to protect yourself Preview 14:58

How to Protect yourself lecture - in this lesson we will give you some tips & tricks on how you can protect your data and devices.

Quiz

Introduction Preview 00:33

Introduction Jobs in Cybersecurity

Jobs in Cybersecurity Preview 08:17

Jobs in Cybersecurity - in this lecture we will explain the cybersecurity jobs market, give you some insights, possible career plans, and from where you can start (even if you don't have any prior IT knowledge, degrees, or certifications).