Course Curriculum
| FUNDAMENTALS OF NETWORKING | |||
| Network Topologies | 00:06:00 | ||
| History and Applications of Computer Networking | 00:06:00 | ||
| Protocols and Standards | 00:04:00 | ||
| Introduction to OSI Model | 00:04:00 | ||
| Layers of OSI Model | 00:07:00 | ||
| Introduction to TCP/IP Model | 00:10:00 | ||
| OSI Model vs TCP/IP Model | 00:04:00 | ||
| Addressing in Computer Networks | 00:09:00 | ||
| IP Address- IPv4 and IPv6 | 00:07:00 | ||
| Classes of IP Address | 00:10:00 | ||
| PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS | 00:03:00 | ||
| PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS | 00:05:00 | ||
| The Internet Protocol (IP) | 00:07:00 | ||
| Address Resolution Protocol (ARP) | 00:09:00 | ||
| Dynamic Host Configuration Protocol (DHCP) | 00:08:00 | ||
| Internet Control Message Protocol (ICMP) | 00:06:00 | ||
| RIP and OSPF Protocols | 00:06:00 | ||
| PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT | 00:03:00 | ||
| What are Sockets? | 00:05:00 | ||
| File Transfer Protocol (FTP) | 00:03:00 | ||
| Hypertext Transfer Protocol (HTTP) | 00:04:00 | ||
| Domain Name System (DNS) | 00:03:00 | ||
| GETTING STARTED WITH CYBER SECURITY | |||
| Definition of Computer Security | 00:03:00 | ||
| Interesting Facts about Cyber Security | 00:05:00 | ||
| History of Cyber Security | 00:07:00 | ||
| Scope and Career Insights in Cyber Security | 00:08:00 | ||
| LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY | |||
| Introduction | 00:01:00 | ||
| Types of Computer Security | 00:03:00 | ||
| Key Terms in Cyber Security | 00:07:00 | ||
| The Elements of Information Security | 00:06:00 | ||
| Types of Attacks | 00:10:00 | ||
| Roles in Cyber Security : Part 1 | 00:08:00 | ||
| Roles in Cyber Security : Part 2 | 00:06:00 | ||
| DIVING DEEP INTO CYBER SECURITY | |||
| Security Architect’s View of Security | 00:08:00 | ||
| What is Vulnerability Assessment? | 00:05:00 | ||
| 4 Phases of Vulnerability Assessment | 00:09:00 | ||
| Introduction to Cryptography | 00:06:00 | ||
| Symmetric Encryption | 00:03:00 | ||
| Asymmetric Encryption | 00:04:00 | ||
| Hashing | 00:07:00 | ||
| Security Organizations | 00:05:00 | ||
| Critical Thinking in Cyber Security | 00:04:00 | ||
| The Five Critical Thinking Skills | 00:06:00 | ||
| PRACTICAL : USING NSLOOKUP TOOL | 00:03:00 | ||
| TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES | |||
| Different types of Actors in Cyber Security | 00:10:00 | ||
| Types of Cyber Attacks | 00:04:00 | ||
| Hacking Organizations around the Globe | 00:05:00 | ||
| Security Services and Mechanisms | 00:03:00 | ||
| Introduction to Threats | 00:03:00 | ||
| What is a Malware? | 00:07:00 | ||
| Types of Trojans | 00:06:00 | ||
| Types of Virus | 00:07:00 | ||
| Have you ever heard about a Ransomware? | 00:09:00 | ||
| The Cyber Kill Chain | 00:09:00 | ||
| Introduction to Social Engineering | 00:05:00 | ||
| Types of Social Engineering | 00:07:00 | ||
| KEY SECURITY CONCEPTS | |||
| Confidentiality – The Most Important Element of Security | 00:04:00 | ||
| Introduction to Incident Response Team | 00:05:00 | ||
| Phases of Incident Response | 00:05:00 | ||
| Laws in Cyber Security | 00:05:00 | ||
| What are Audits in Cyber Security | 00:04:00 | ||
| Internal Audit vs External Audit | 00:04:00 | ||
| The NIST Framework | 00:03:00 | ||
| The COBIT Framework | 00:04:00 | ||
| FIREWALLS AND ANTIVIRUS | |||
| Intrusion Detection System | 00:05:00 | ||
| Introduction to Firewalls | 00:05:00 | ||
| What is DMZ? | 00:04:00 | ||
| Different types of Firewalls | 00:09:00 | ||
Review
COURSE REVIEWS
Course Reviews
No Reviews found for this course.





