Course curriculum

    1. How to use this course

    2. 1. Introduction to Cybersecurity

    1. 2. Defining Threat & Risk

    2. 3. CIA Triad

    3. 4a. Risk Management

    4. 4b. Risk Management

    5. 5. Cybersecurity Policies and Procedures

    6. 6. Key components of Cybersecurity Policies & Procedures

    7. 7. Key components of Cybersecurity Policies & Procedures-2

    8. 8. Network Security

    9. 9.Network Security Devices

    10. 10. VPN & Malware

    11. 11. Types of Malwares

    1. 12. Anti-Virus & Malware Protection Strategies

    2. 13. Secure Web Browsing

    3. 14. Identifying Phishing Attacks

    4. 15. Web Security Certificates

    5. 16. Access Control and Authentication Methods

    6. 17. Password Complexity Table (Password Brute-Force Table)

    7. 18. Authentication Methods

    8. 19. Access Control Methods

    9. 20. Data Protection & Encryption

    10. 21. Encryption & Hashing Algorithms

    11. 22. Data Privacy Regulations

    12. 23. Security Best Practices

    1. 24. Cybersecurity Careers and Next Steps

    2. 25. Cybersecurity, Ethical Hacking and Pen Testing

About this course

  • Free
  • 27 lessons
  • 4 hours of video content

Discover your potential, starting today