Cyber Security Go From Zero To Hero ( 2020)

About This Course

This is a free Course.

Please don’t forget to support our causes by helping us fund our free ICT training classes and befriending events for the elderly.

You can learn more about ways to support our cause Here.

What I will learn?

  • Cyber Security

Course Curriculum

Cyber Security Go From Zero To Hero ( 2020)

  • 10. Layers of OSI Model.
    07:58
  • 11. Introduction to TCPIP Model.
    09:51
  • 12. OSI Model vs TCPIP Model.
    04:13
  • 14. Addressing in Computer Networks.
    08:30
  • 15. IP Address- IPv4 and IPv6.
    06:37
  • 16. Introduction to Classes of IP Addressing.
    03:43
  • 17. Classes of IP Address.
    10:01
  • 18. PRACTICAL HOW TO FIND OUT YOUR PC’s IP ADDRESS.
    03:23
  • 19. PRACTICAL HOW TO FIND OUT YOUR PC’S MAC ADDRESS.
    04:53
  • 2. What is Computer Networking – Definition and Characteristics.
    02:50
  • 20. The Internet Protocol (IP).
    06:31
  • 22. Address Resolution Protocol (ARP).
    08:47
  • 24. Dynamic Host Configuration Protocol (DHCP).
    07:48
  • 25. Internet Control Message Protocol (ICMP).
    06:16
  • 26. RIP and OSPF Protocols.
    05:32
  • 27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.
    02:41
  • 28. What are Sockets.
    05:07
  • 29. File Transfer Protocol (FTP).
    03:17
  • 29. File Transfer Protocol (FTP).
    06:09
  • 30. Hypertext Transfer Protocol (HTTP).
    00:00
  • 31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).
    05:23
  • 32. Domain Name System (DNS).
    03:05
  • 34. Conclusion.
    00:37
  • 4. Meet the instructors!.
    00:21
  • 5. History and Applications of Computer Networking.
    05:51
  • 7. Protocols and Standards.
    04:21
  • 9. Introduction to OSI Model.
    03:49
  • 1. Definition of Computer Security.
    03:04
  • 2. Interesting Facts about Cyber Security.
    05:23
  • 3. Have a look at this!.
    00:34
  • 4. History of Cyber Security.
    06:54
  • 5. Scope and Career Insights in Cyber Security.
    08:10
  • 8. Conclusion.
    00:31
  • 1. Introduction.
    01:10
  • 12. Conclusion.
    00:39
  • 2. Standard Definition of Cyber Security.
    02:37
  • 3. Types of Computer Security.
    02:39
  • 4. Key Terms in Cyber Security
    00:00
  • 5. The Elements of Information Security.
    05:56
  • 6. Types of Attacks.
    10:22
  • 7. Roles in Cyber Security Part 1.
    08:12
  • 8. Roles in Cyber Security Part 2.
    05:40
  • 9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.
    05:02
  • 1. Introduction.
    01:19
  • 10. Symmetric Encryption.
    00:00
  • 11. AES and DES.
    06:04
  • 12. Asymmetric Encryption.
    02:48
  • 14. RSA & Diffie Hellman.
    07:02
  • 15. Hashing.
    07:03
  • 16. Security Organizations.
    05:02
  • 17. Critical Thinking in Cyber Security.
    03:36
  • 18. The Five Critical Thinking Skills.
    05:40
  • 19. PRACTICAL USING NSLOOKUP TOOL.
    02:51
  • 2. Security Architect’s View of Security.
    08:09
  • 20. PRACTICAL USING NETSTAT TOOL
    03:57
  • 22. Conclusion.
    00:30
  • 3. What is Vulnerability Assessment.
    04:34
  • 4. 4 Phases of Vulnerability Assessment.
    08:35
  • 5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.
    01:28
  • 6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.
    05:35
  • 7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.
    03:23
  • 8. PRACTICAL GOING THROUGH SCANNED RESULTS.
    02:58
  • 9. Introduction to Cryptography.
    04:42
  • 1. Introduction.
    00:52
  • 10. OH MY GOD! VIRUS!!.
    07:03
  • 11. Types of Virus.
    10:12
  • 12. You should defend yourself!.
    07:27
  • 13. Have you ever heard about a Ransomware.
    00:00
  • 15. PRACTICAL INFORMATION GATHERING USING SHODAN.
    08:50
  • 16. The Cyber Kill Chain.
    08:35
  • 17. Introduction to Social Engineering.
    04:45
  • 18. Types of Social Engineering.
    05:48
  • 19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.
    09:52
  • 2. Different types of Actors in Cyber Security.
    09:47
  • 21. Conclusion.
    00:36
  • 3. Types of Cyber Attacks.
    04:03
  • 4. Hacking Organizations around the Globe.
    04:53
  • 5. Security Services and Mechanisms.
    03:15
  • 6. Introduction to Threats
    03:11
  • 7. What is a Malware.
    08:45
  • 8. Everything about Trojans.
    00:00
  • 9. Types of Trojans.
    08:06
  • 1. Introduction.
    01:09
  • 10. The NIST Framework.
    03:21
  • 11. The COBIT Framework.
    03:46
  • 12. Other Security Frameworks.
    04:32
  • 15. Conclusion.
    00:38
  • 2. Confidentiality – The Most Important Element of Security.
    04:13
  • 3. Integrity, Authentication, Access Control and Non-Repudiation.
    88:24
  • 4. Introduction to Incident Response Team.
    00:00
  • 5. Phases of Incident Response
    05:04
  • 6. Laws in Cyber Security.
    05:16
  • 7. What are Audits in Cyber Security.
    00:00
  • 8. Internal Audit vs External Audit.
    04:19
  • 9. How to carry out an Internal Audit.
    00:00
  • 1. Introduction.
    01:06
  • 10. Firewalls vs Antivirus.
    01:39
  • 12. CONGRATULATIONS!.
    01:41
  • 2. Intrusion Detection System.
    11:03
  • 3. Introduction to Firewalls.
    09:34
  • 4. IDS evasion techniques.
    07:54
  • 5. What is DMZ.
    06:17
  • 6. Firewall evasion techniques.
    08:44
  • 7. Different types of Firewalls.
    08:59
  • 8. The Antivirus!.
    03:03
  • 9. Antivirus Detection Techniques.
    09:26
Free
Free
Free access this course

Course info:

Categories Free Courses

Target Audience

  • This Course is aimed at anyone who wants to learn.