Description
The objective of this course is to turn you into a cyber security specialist in under 8 hours.
Do you want to start a cyber security career?
Do you want to improve your cyber security skills?
Do you want to improve the IT security of your organization?
Do you want to review and pass the CompTIA Security+ exam?
THIS IS THE RIGHT CYBER SECURITY COURSE FOR YOU!
Learn what are the Cyber Security principles
How to measure security risks
The best Identity and Access Management to keep your users safe
Improve your password management and keep your passwords secure
Learn what is MFA
Learn how to keep away hackers and social engineering from getting sensitive files, emails, or access to your computer or network
Learn about cyber security awareness
Apply the most secure IT protocols and encryption methods
Keep your data protected with encryption
Learn about network models and IP models
Learn everything about Cryptography, Hashing and Digital Signatures
Learn how RSA and ECDSA works
Keep your infrastructure more secure
Data encryption
Prevent DDoS attacks
Learn about the different types of malware
Social engineering attacks and hot to prevent them
Phishing
Logging and monitoring tools
Improve your system resilience
Application Architecture and Infrastructure
The different types of cloud models: IaaS, PaaS, FaaS and SaaS
What is a VPC
Firewalls
Testing your applications for security
Learn how to securely develop an application
Learn how to respond to incidents
This course has over 6 hours of video plus 55 questions that will help you to better understand Cyber Security. If you are looking to take the Comptia Security+ exam, this will also be a good help.
This complete Cyber Security Course includes the following topics:
Cybersecurity Principles
The CIA triad
The AAA of security
Non-repudiation
Measuring risks
Governance and Procurement
Secure Protocols
Network Models
OSI vs TCP/IP Model
TCP/IP Model
Transport Protocols
IP Models
Application protocols and ports
Cryptography, hashing and digital signatures
Consensus mechanisms
Hashing
Digital signatures
Multi-signatures
Random numbers
Prime numbers
RSA
ECDSA
Quantum Computing
Infrastructure Security
Data Encryption
Denial of Service
Man-in-the-middle attack
Attacking applications
Malware
Virus
Adware
Spyware
Trojan horses
Ransomware
Logic Bombs
Rootkit and backdoors
Polymorphic Malware, Keyloggers and Armored Viruses
Social engineering attacks
Logging and Monitoring
System Resiliency
Redundancy
Backups
Snapshots
High Availability
Disaster Recovery
Infrastructure hardening
Application Architecture and Infrastructure
Cloud models
VPCs
NACLs
Network Firewalls
Testing your application
Testing your infrastructure
Other security practices
Secure DevOps
Secure Development and Deployment
Incident Detection and Response
Contingency Planning