Cyber Security Guide For Absolute Beginners 2020
Created by Dhabaleshwar Das, Last Updated 11-Mar-2020, Language:English
Cyber Security Guide For Absolute Beginners 2020
Learn Cyber Security core concepts such as hacking, viruses, Encryption, Trojan, Spyware, Bots & Botnets, DMZ & more
Created by Dhabaleshwar Das, Last Updated 11-Mar-2020, Language:English
What Will I Get ?
- Learn how to keep your kids and parents safe from cyber criminal actions.
- Understanding basic concepts and terminologies used in information security and cyber security.
- Understanding , Identifying & Preventing Malware.
- Learn About Browser Security
- Bulletproof your online accounts (email, social media, etc.) and all the personal data that you've stored online.
- Learning about the most dangerous hacking attacks and their prevention.
- Learning About BFA (Brute Force Attack) , IP Spoofing, Url Spoofing, LDAP Injection, SQL Injection, MIMA, Phishing Attacks and much more.
- Discover how cyber attacks work, How to avoid virus infections and How you can counteract their malicious consequences.
Requirements
- Willingness to learn
- You should know how to use a computer.
- You should know how to use an internet.
- Headphones / Earphones / Speakers ( OPTIONAL) .
Description
I know why you are here. You are an intelligent and curious guy always searching words like firewalls, encryption, viruses and malware sound but couldn't get a satisfactory answer but don't worry we have a course right for you that teaches you all the basics of both information and cyber security in a fun relaxed manner. This course is made in such a way that it fits absolutely perfect for you.
It doesn't matter if you don't know anything about cyber security, because this course will help you understand what it's all about. Even if you know the basics, you might still discover tips and tricks that really make a difference.
So if you love gadgets, apps and everything that the Internet has to offer - you need this course!
Remember: in the online world, with great opportunities come great threats as well.
This course serves as an introduction to the exciting field of cyber security.
As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cyber security.
In this course, you will gain an overview of the cyber security landscape.
PERFECT FOR COMPLETE BEGINNERS
This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security.
These are the things that you are going to learn in the course:
SECTION 1 (CYBER SECURITY COURSE) & SECTION 2 (CYBER SECURITY COURSE) will cover basic terminologies and hacking methodology and also learn about grey,blue,black,red,white hat hackers.
Section 3 (Cyber Security Course)
Phishing
Brute Force Attack
DoS & DDoS Attacks
Bots and Botnets
SQL Injection
LDAP Injection
MITM
URL Spoofing
IP Spoofing and much more
Then moving forward we will learn about Malware their types like viruses, trojan , spywares, ransomware etc. in SECTION -3 (CYBER SECURITY COURSE).
Section 4 (Cyber Security Course)
Antivirus
DMZ
Encryption
HoneyPots
2FA ( 2 Factor Authentication )and much more
AND ALSO THERE IS A SMALL GIFT/SURPRISE FROM MY SIDE IN HERE ( You will love it !!!! )
Job Outlook
Exciting career opportunities as security analyst, security engineer, security architect, forensics investigator, cybersecurity specialist, and more!
Cyber security positions are expected to rise 6 million globally by 2019 (source: Forbes, January 2016)
If you are already in the IT field, expect a 9% raise in pay for security expertise (source: Forbes, January 2016)
Median salary for information security analyst for 2015 is $90,000 (source: US Bureau of Labor Statistics)
THE DEMAND FOR CYBER SECURITY EXPERTS IS INCREASING AT A VERY HIGH RATE !!!!!!!!
THEY ARE SEARCHING FOR EXPERTS LIKE YOU ......
This course will prove to be a steeping milestone in your cyber security & Ethical hacking career and by the end of this course you would be familiar with so many terminologies and would have gained sufficient knowledge that can help to jump start your career as an information security professional.
SO WHAT ARE YOU WAITING FOR?? ENROLL NOW AND FULFILL ALL YOUR DREAMS
Who this course is for
- I created this course for everyone who wants to learn how to stay safe online.
- Students who want to learn the basics of computer and cyber security.
- Students who want to become IT or Cyber Security Experts.
Course Content
-
Basic Introduction to Cyber security & Information Security
11 Lectures 00:36:06-
A Warm Welcome To This Course
Preview00:01:54 -
What is Cyber Security
00:00:48 -
Difference Between Cyber Security & Information Security
Preview00:01:55 -
The Three Principles Of Cyber Security
00:04:39 -
Computer Protocols Part-1
00:04:00 -
Computer Protocols Part-2
00:02:16 -
WHAT IS SSL, TLS, HTTPS & SSH
00:04:24 -
Heartbleed Vulnerability
00:04:29 -
Web Browsers In Security
00:03:21 -
Safe & FREE extensions For Browser Security Part-1
00:05:00 -
Safe & FREE extensions For Browser Security Part-2
00:03:20
-
-
Some Basics About A Hacker
6 Lectures 00:19:25-
Top 5 Hollywood Movies- You must watch if you love hacking
00:04:15 -
What is Hacking ? What is a Hacker ?
00:02:49 -
Most Famous Hackers
Preview -
Types Of Hackers
00:03:52 -
WHOIS Query
00:04:05 -
Social Engineering
00:04:24
-
-
Attacks From Hackers
9 Lectures 00:26:55-
Phishing
Preview00:04:56 -
Brute Force Attack (BFA)
00:03:05 -
DOS & DDOS Attack
00:04:17 -
Botnets
00:02:47 -
Man-In-The-Middle-Attack (MITM)
00:03:01 -
IP Spoofing
00:02:18 -
URL Spoofing
00:01:49 -
SQL Injections
00:01:51 -
LDAP Injections
00:02:51
-
-
Malware
6 Lectures 00:13:58-
What is Malware ?
00:00:42 -
Viruses v/s Worms
00:02:47 -
Trojans
00:03:21 -
Ransomware
00:03:32 -
Spyware
00:01:48 -
Rootkits
00:01:48
-
-
Digital Wallets
2 Lectures 00:07:02-
Introduction ( BARTER SYSTEM )
Preview00:02:33 -
Digital Wallets
00:04:29
-
-
Defenses
5 Lectures 00:14:14-
Antivirus
00:03:34 -
Firewall
00:02:03 -
Encryption
00:03:44 -
2FA ( 2 FACTOR AUTHENTICATION )
00:02:30 -
Honey Pots & DMZs
00:02:23
-
-
Email & Security
5 Lectures 00:10:22-
Email & Security Introduction
00:00:50 -
Email V/S Snail Mail
00:01:59 -
Process of Sending an email (TECHNICAL ASPECT)
00:02:00 -
Security Threats for Email
00:03:02 -
Defense against It
00:02:31
-
-
Extras & Gifts For You Beautiful Students
3 Lectures 00:04:39-
Busting Some Cyber Security Myths
00:04:39 -
5 Highest-Paid Cyber Security Jobs
Preview -
My Favorite Tools For Hacking
Preview
-

Dhabaleshwar Das
Digital Marketing Expert|Certified Ethical Hacker|Cyber Security Consultant
Hi! I'm Dhabaleshwar. Ooh, I know its a long name, so people call me Dhabal. I am a digital marketer, ethical hacker and you might also call me a programming geek. I am also known by the name of DD in the music industry.Ya! you can find me everywhere.