Learn Cyber Security
[dearpdf id=”24187″ ][/dearpdf]
Curriculum
- 11 Sections
- 66 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Cyber Security and Cyber CrimeCyber Crime What is Cyber Crime? Just like regular crime, it also exists on the Internet. Here are some examples of Cyber Crime: Identity Theft Online Predators BEC ("Business Email Compromise") Ransomware Stealing of sensitive intellectual property9
- Networking Basics9
- 2.1Lesson 10 : Protocols and Networking
- 2.2Lesson 11 : The OSI Model (“Open Systems Interconnection”)
- 2.3Lesson 12: Layer 7 – Application Layer
- 2.4Lesson 13 : Layer 6 – Presentation Layer
- 2.5Lesson 14 : Layer 5 – Session Layer
- 2.6Lesson 15 : Layer 4 – Transport
- 2.7Lesson 16: Layer 3 – Network
- 2.8Lesson 17: Layer 2 – Link
- 2.9Lesson 18: Layer 1 – Physical
- IP - The Internet Protocol8
- 3.1Lesson 19: Different Networks
- 3.2Lesson 20: NAT (“Network Address Translation”)
- 3.3Lesson 21 : IPv6 – IP Version 6
- 3.4Lesson 22 : ICMP
- 3.5Lesson 23: Traceroute
- 3.6Lesson 24: DNS (“Domain Name System”)
- 3.7Lesson 25: DHCP (“Dynamic Host Configuration Protocol”)
- 3.8Lesson 26: VPN (“Virtual Private Network”)
- Network Transport8
- Firewalls5
- Web Application11
- 6.1Lesson 40:T he HTTP protocol
- 6.2Lesson 41: URLs, Query Parameters and Scheme
- 6.3Lesson 42: HTTP Headers
- 6.4Lesson 43: HTTP Verbs
- 6.5Lesson 44: HTTP Response Codes
- 6.6Lesson 45: REST
- 6.7Lesson 46: Sessions & State
- 6.8Lesson 47: Virtual Hosts
- 6.9Lesson 48: URL Encoding
- 6.10Lesson 49: JavaScript
- 6.11Lesson 50: Encryption with TLS
- Cyber Attacks0
- Cyber Defence7
- 8.1Lesson 51: Cyber Security Security Operations
- 8.2Lesson 52: SIEM (“Security Information Event Management”)
- 8.3Lesson 53: SOC Staffing
- 8.4Lesson 54: Escalation Chains
- 8.5Lesson 55: Classification of Incidents
- 8.6Lesson 56: SOAR (“Security Orchestration, Automation and Response”)
- 8.7Lesson 57: What to monitor?
- Cyber Security Incident Response9
- Cyber Security Quiz0
- Cyber Security Exam0
Instructors
FAQs
The word Cybersecurity is made up of two words. Cyber and security. So, this course is about these two combined words and their application to our daily lives.
The word "cyber" denotes a relationship with information technology (IT), i.e., computers. Basically, it involves all aspects of computing, including storing data, protecting data, accessing data, processing data, transmitting data, etc. In the late 1940s, the term cybernetics was coined by mathematician Norbert Wiener. It’s defined as the study of control systems and communication between people and machines. Weiner used the ancient Greek word cyber, which is related to the idea of governing.
Security is protection from, or resilience against, potential harm and or other unwanted coercive acts caused by others, such as restraining the freedom of others to act. Referents of security may be persons and social groups, objects, institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. For example, A
Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
Application security focuses on keeping software and devices free of threats.
Information security protects the integrity and privacy of data, both in storage and in transit
A policy is a set of rules or guidelines for your organization and employees to follow in or to achieve compliance. Policies answer questions about what employees do and why they do it. A procedure is the instructions on how a policy is followed.
A security policy is a clearly defined document that states in writing how a company plans to protect its physical and information technology (IT) resources. As technology changes, these documents are also updated and or changed to reflect the new vulnerabilities.
The intentional commission or omission of an act usually deemed socially harmful or dangerous and specifically defined, prohibited, and punishable under criminal law
A Criminal activity that involves a computer, the internet, or a computer network. The computer may have been used in committing the crime, or the computer may be the target to harm someone's security and or finances.
Requirements
- Learners need to possess an understanding of the English language
- No Information Technology Knowledge Experience Necessary
- The willingness to Learn at Your Own Pace Online
- Full Internet Access to be able to learn from any location globally
Features
- Improved Computer Data Security
- Better Regulatory Compliance
Target audiences
- End-user who uses cyber infrastructure to conduct their business
- Technical People that are responsible for parts or all of the infrastructure and the services that this infrastructure provides.
- People in different levels of management
- All levels of IT auditor/penetration tester
- Security consultants/managers
- Information Technology directors/managers/consultants
- Internet Security auditors/architects
- Security systems engineers
- Chief information security officers (CISOs)
- Chief compliance/privacy/risk officers
- Network specialists, analysts, managers, architects, consultants or administrators
- Technical support engineers and Systems analysts or administrators