Cyber Security : Go from Zero to Hero (2020)
Created by Chinmay Kulkarni, Yash Kulkarni, Last Updated 11-Jul-2020, Language:English
Cyber Security : Go from Zero to Hero (2020)
Learn entire Networking, Cybersecurity, Attacks, Cryptography, Security Audits, Hacking, Web Application Threats
Created by Chinmay Kulkarni, Yash Kulkarni, Last Updated 11-Jul-2020, Language:English
What Will I Get ?
- Become Expert in Computer Networking
- Fundamentals of Cybersecurity that will help students to dive in this field and Different Types of Attacks and world famous cyber attack examples
- Entire networking related to Cyber security and Terminologies - Threat, Vulnerability, Incident, Management, Attacks, Exploits, Events
- Careers and job opportunities in Cyber security
- Roles in Cybersecurity - CISO, CISM, CISA, Penetration Tester, Incident Response Teams
- Fundamentals of Cryptography
- Learn about different Cyber security organizations - NIST, NSA, SANS Institute, OWASP, CISCO
- A brief overview of malware and its types
- Overview of Security Audits and Frameworks
- Self Evaluation through quizzes
Requirements
- IMPORTANT - You should be enthusiastic to learn Cyber Security
- Be able to understand English
- Basic knowledge of Computers
- Rest everything leave it to us, we will take you from novice to expert!
Description
The field of technology is growing exponentially with the IT sector flourishing every day. Amidst such growth of the industry and increased concern for privacy, the demand for security is rising. Cybersecurity has become an everyday struggle for many businesses. Recent trends and statistics reveal that there is a huge increase in hacked and breached data from very common sources at workplaces. So go for this course to get a better understanding of cyber security!
Most of the people are often confused when they are asked - “WHAT IS CYBER SECURITY?” The most common reply is - “UM, HACKING. ” Well, hacking is part of cyber security but it doesn’t mean that hacking is the synonym of cyber security. Many courses out there only teach how to use the tool but the reasoning that goes behind its selection is not taught. Also, the main focus of these courses is on hacking but it is not the only domain in cyber security. Other major domains are Incident Response Management, Blue team, Security Audits, IT Security Management, Security laws and many more.
----------------------------------------------------------------------------------------------------------------------
" I was doubting on this course as this was a new one. But getting started with the course gave me a good insight of Cyber Security and all my concepts were cleared about Computer Networking in the first section itself. No course based on Cyber Security includes Networking but this course has covered the same so I preferred this course. " ~ Student
----------------------------------------------------------------------------------------------------------------------
Well University of Maryland, United States, says,
Hackers attack every 39 seconds, on average 2,244 times a day.
So are you sure that your data is well protected from these hackers? Have you even configured your network to control your privacy? Do you know how hackers can access your devices without your knowledge?? Well, don’t worry! We are here to answer these questions. There must be many questions in your mind regarding this course. We will surely address all once you enroll for this course, but for the time being, we’ll focus on the following questions:
WHY SHOULD I LEARN CYBER SECURITY?
Let’s face it. We live in a digital world. Our work lives, personal lives, and finances have all begun gravitating toward the world of the internet, mobile computing, and electronic media. Unfortunately, this widespread phenomenon makes us more vulnerable than ever to malicious attacks, invasions of privacy, fraud, and other such frightening cases. This is why cyber security is such a vital part of a secure and well-ordered digital world. Cybersecurity keeps us safe from hackers, cyber criminals, and other agents of fraud.
But let me ask you a question,
HOW GOOD IS YOUR KNOWLEDGE ABOUT CYBER SECURITY?
----------------------------------------------------------------------------------------------------------------------
" This course is very useful for learning the basics of cyber security. I was not familiar with the terms at first but after opting for learning something new I learned new terms. The instructors are very helpful and they make us understand the concepts in ease and the explanation provided by them is very quick to grasp. So thank you for sharing this amazing course." ~ Student and Security Researcher
----------------------------------------------------------------------------------------------------------------------
Here are some facts that would blow up your mind!
1. According to Varonis, Worldwide spending on cyber security is forecasted to reach $133.7 billion in 2022.
2. Data breaches exposed 4.1 billion records in the first half of 2019.
3. Symantec says, the top malicious email attachment types are .doc and .dot which makes up 37%, the next highest is .exe at 19.5%
These are not just facts but they are warnings! Everyone who is accessing a device should be aware of their security and that is why we have designed this course. Okay, here comes the next question.
UM, OKAY! BUT WHY SHOULD I ENROLL FOR THIS COURSE?
The perfect answer to this question would be - Have a look at our curriculum. Cyber Security - Zero to Hero is the first part of our CYBER SECURITY SPECIALIZATION. In this course, we have covered from the basics of the computer to networking right up to advanced concepts such as cryptography, security auditing, incident management. Yes, we have started right from the definition of a Computer Network. Our course is broadly divided into seven sections. In the first section, we will cover the basics of networking. We will discuss the various protocols and their usage. We will talk about IP addresses and their classes and cover many important points in the field of cyber security.
Bonus Material -We have also included interesting practicals !!
In the second section, we dive into cyber security. We discuss right from the history of cyber security to different trending terminologies. We have specially designed the curriculum to make sure even a novice student can understand the concepts. The course will help you develop critical thinking needed to pursue a career in Cyber security. You will also get to know about organizations and resources which provide assistance and framework in this field. We recommend you to watch our introductory video where we have discussed the entire syllabus :) Have a look at the few features of our course.
1. Handpicked curriculum, specially designed for all levels of learners.
2. Continuous assessment through challenging quizzes.
3. Get your questions answered within 48 hours.
4. A variety of resources such as useful links, books, PDFs are also provided.
5. Regular updates made to the curriculum.
6. Different aspects of Cybersecurity explored.
7. Practicals with explanation included.
8. Understand how cryptography works in real life.
9. Real-life examples such as firewalls, antivirus, cyber-attacks are also discussed and much more.
Suggestions are always welcome :)
WHO CAN ENROLL FOR THIS COURSE?
This course is not intended for a specific group of people. Anyone who wants to learn about cyber security can enroll for this course. If you already know a few concepts, you can always revisit the ideas and clear. We have covered statistics along with technical topics. In short, this is a perfect course for you if you want to kick start your career in cyber security!
BOTTOM LINE -
Once you move ahead in this course, you will get a clear idea about what cyber security is. We have assembled this course in a way that you will enjoy and learn along the way.
Course Content
-
FUNDAMENTALS OF NETWORKING
24 Lectures 02:09:37-
What is Computer Networking - Definition and Characteristics
Preview00:02:49 -
Network Topologies
Preview00:06:09 -
History and Applications of Computer Networking
Preview00:05:51 -
Protocols and Standards
00:04:21 -
Introduction to OSI Model
00:03:49 -
Layers of OSI Model
00:07:23 -
Introduction to TCP/IP Model
00:09:50 -
OSI Model vs TCP/IP Model
00:04:13 -
Addressing in Computer Networks
00:08:30 -
IP Address- IPv4 and IPv6
00:06:39 -
Finding your own IP Address
00:03:23 -
Finding your own MAC Address
00:04:53 -
The Internet Protocol
Preview00:06:30 -
Finding Target Domain's IP Address
00:03:06 -
Address Resolution Protocol
00:08:47 -
Dynamic Host Configuration Protocol
00:07:48 -
Internet Control Message Protocol
00:06:16 -
Routing Protocols
00:05:32 -
How to use Tracert Command?
00:02:41 -
Introduction to Sockets
00:05:06 -
File Transfer Protocol
00:03:17 -
Hyper Text Transfer Protocol
00:04:17 -
Hypertext Transfer Protocol over SSL
00:05:22 -
Domain Name System
00:03:05
-
-
GETTING STARTED WITH CYBER SECURITY
4 Lectures 00:26:04-
What is Security?
Preview00:05:40 -
What is Cyber Security
00:05:22 -
History of Cyber Security
00:06:53 -
Scope and Career insights
00:08:09
-
-
FUNDAMENTALS OF CYBER SECURITY
7 Lectures 00:41:59-
Definition of Computer Security
Preview00:02:37 -
Types of Computer Security
00:02:38 -
Key Terms in Cyber Security
00:06:35 -
Elements of Information Security
00:05:56 -
Types of Attacks
00:10:22 -
Roles of Cyber Security Part 1
00:08:11 -
Roles of Cyber Security Part 2
00:05:40
-
-
DIVING DEEP INTO CYBER SECURITY
8 Lectures 00:47:08-
Security Architect's View
00:08:09 -
What is Vulnerability Assessment
00:04:34 -
Phases of Vulnerability Assessment
00:08:55 -
Asymmetric Encryption
00:04:03 -
Hashing
00:07:12 -
Organisations in Security
00:05:01 -
What is Critical Thinking
00:03:35 -
5 Skills of Critical Thinking
00:05:39
-
-
TYPES OF ACTORS, ATTACKS AND MALWARE THREATS
9 Lectures 00:44:47-
Confidentiality
00:04:13 -
Integrity, Authentication, Access Control and Non Repudiation
00:08:23 -
Introduction To Incident Response Team
00:05:21 -
What are Audits in Cyber Security?
00:09:21 -
Internal Audits vs External Audits
00:04:19 -
How to carry out an Internal Audit?
00:01:32 -
The NIST Framework
00:03:21 -
The COBIT Framework
00:03:46 -
Different types of Frameworks
00:04:31
-
-
FIREWALLS AND ANTIVIRUS 11
8 Lectures 00:42:32-
Intrusion Detection System
00:05:22 -
Introduction to Firewalls
00:04:34 -
Firewall Architecture
00:05:39 -
Have you ever heard of a DMZ?
00:03:50 -
Different Types of Firewalls
00:08:59 -
Definition of Antivirus
00:03:03 -
Antivirus Detection Techniques
00:09:26 -
Firewalls Vs Antivirus
00:01:39
-