Course Curriculum
FUNDAMENTALS OF NETWORKING | |||
Network Topologies | 00:06:00 | ||
History and Applications of Computer Networking | 00:06:00 | ||
Protocols and Standards | 00:04:00 | ||
Introduction to OSI Model | 00:04:00 | ||
Layers of OSI Model | 00:07:00 | ||
Introduction to TCP/IP Model | 00:10:00 | ||
OSI Model vs TCP/IP Model | 00:04:00 | ||
Addressing in Computer Networks | 00:09:00 | ||
IP Address- IPv4 and IPv6 | 00:07:00 | ||
Classes of IP Address | 00:10:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS | 00:03:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS | 00:05:00 | ||
The Internet Protocol (IP) | 00:07:00 | ||
Address Resolution Protocol (ARP) | 00:09:00 | ||
Dynamic Host Configuration Protocol (DHCP) | 00:08:00 | ||
Internet Control Message Protocol (ICMP) | 00:06:00 | ||
RIP and OSPF Protocols | 00:06:00 | ||
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT | 00:03:00 | ||
What are Sockets? | 00:05:00 | ||
File Transfer Protocol (FTP) | 00:03:00 | ||
Hypertext Transfer Protocol (HTTP) | 00:04:00 | ||
Domain Name System (DNS) | 00:03:00 | ||
GETTING STARTED WITH CYBER SECURITY | |||
Definition of Computer Security | 00:03:00 | ||
Interesting Facts about Cyber Security | 00:05:00 | ||
History of Cyber Security | 00:07:00 | ||
Scope and Career Insights in Cyber Security | 00:08:00 | ||
LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY | |||
Introduction | 00:01:00 | ||
Types of Computer Security | 00:03:00 | ||
Key Terms in Cyber Security | 00:07:00 | ||
The Elements of Information Security | 00:06:00 | ||
Types of Attacks | 00:10:00 | ||
Roles in Cyber Security : Part 1 | 00:08:00 | ||
Roles in Cyber Security : Part 2 | 00:06:00 | ||
DIVING DEEP INTO CYBER SECURITY | |||
Security Architect’s View of Security | 00:08:00 | ||
What is Vulnerability Assessment? | 00:05:00 | ||
4 Phases of Vulnerability Assessment | 00:09:00 | ||
Introduction to Cryptography | 00:06:00 | ||
Symmetric Encryption | 00:03:00 | ||
Asymmetric Encryption | 00:04:00 | ||
Hashing | 00:07:00 | ||
Security Organizations | 00:05:00 | ||
Critical Thinking in Cyber Security | 00:04:00 | ||
The Five Critical Thinking Skills | 00:06:00 | ||
PRACTICAL : USING NSLOOKUP TOOL | 00:03:00 | ||
TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES | |||
Different types of Actors in Cyber Security | 00:10:00 | ||
Types of Cyber Attacks | 00:04:00 | ||
Hacking Organizations around the Globe | 00:05:00 | ||
Security Services and Mechanisms | 00:03:00 | ||
Introduction to Threats | 00:03:00 | ||
What is a Malware? | 00:07:00 | ||
Types of Trojans | 00:06:00 | ||
Types of Virus | 00:07:00 | ||
Have you ever heard about a Ransomware? | 00:09:00 | ||
The Cyber Kill Chain | 00:09:00 | ||
Introduction to Social Engineering | 00:05:00 | ||
Types of Social Engineering | 00:07:00 | ||
KEY SECURITY CONCEPTS | |||
Confidentiality – The Most Important Element of Security | 00:04:00 | ||
Introduction to Incident Response Team | 00:05:00 | ||
Phases of Incident Response | 00:05:00 | ||
Laws in Cyber Security | 00:05:00 | ||
What are Audits in Cyber Security | 00:04:00 | ||
Internal Audit vs External Audit | 00:04:00 | ||
The NIST Framework | 00:03:00 | ||
The COBIT Framework | 00:04:00 | ||
FIREWALLS AND ANTIVIRUS | |||
Intrusion Detection System | 00:05:00 | ||
Introduction to Firewalls | 00:05:00 | ||
What is DMZ? | 00:04:00 | ||
Different types of Firewalls | 00:09:00 |
Review
COURSE REVIEWS
Course Reviews
No Reviews found for this course.