General Introduction to IT & Cyber Security
  • Welcome to the Course
  • Connect with Me
  • Udemy Rating System - Very Important !!!
  • Difference Between Information Security and Cyber Security
  • The Trinity of IT Security - CIA
  • Basic Terminologies
  • Computer Protocols
  • Cookies
  • The TCP/IP
  • Section Quiz
Mind of a Hacker
  • Section Intro
  • What is NOT Hacking
  • Types of Hackers
  • The Hacking Methodology
  • The WhoIS Query
  • Social Engineering
  • Section Quiz
Attacks
  • Intro to the Section
  • Brute Force Attacks
  • Phishing
  • Phishing - Part 2
  • Phishing - Part 3
  • Bots and Botnets
  • DoS and DDoS
  • Pings
  • Man in the Middle Attacks
  • SQL Injections
  • Section Quiz
Malware
  • Introduction to Malware
  • Viruses & Worms
  • Trojans
  • Adware and Spyware
  • Ransomware
  • Other Types of Malware
  • Section Quiz
Defences
  • Section Intro
  • Anti Virus
  • Encryption
  • Firewalls
  • Biometrics
  • Factor Authentication Methods
  • Honey Pots and DMZs
  • Security for Wireless Networks
  • Password Management
  • Section Quiz
Information Security at the Work Place
  • BYOD Management
  • A Sample BYOD Policy
  • Mobile Device Management
  • The Security vs Ease of Access Paradox
  • The Weakest Link & The Disgruntled Employee
  • Review Update
Cyber Warfare and Cyber Attacks Against Companies
  • Introduction to Cyber Warfare
  • The Attack Against Estonia
  • Stuxnet and the Attack Against Iran
  • The Sony Hack
Extras and Conclusion
  • Course Promo
  • Actionable Steps for Personal Security
  • Biggest Myths of Online Security
  • SPECIAL LESSON - How to Launch your Career in Cyber Security
  • Getting your Certificate
  • Conclusion