Cyber Security: Info Security, Combat Cyber Threats, ChatGPT

Get instant access to an 87-page workbook of Cyber Security Awareness
Introduce yourself to our community of students in this course and tell us your goals.
This course will also tackle Security Measures; What is a Firewall; Types of Firewall; Cyber Law; Why there is a need for Cyber Law; What is Cyber Crime; Classification of Cyber Crime; Cyber Crimes Against Person; Cyber Crime Against Persons Property; Cyber Crime against Government; Cyber Crime against Society at Large; Definition of Digital Forensics; Process of Digital Forensics; Digital Forensics.
What you’ll learn
- Explain the differences between Threat, Vulnerability, and Risk
- Explore the needed skills set and job profiles in the field of Cybersecurity
- Discuss the evolution of threats and the types of security goals
- Define what cybersecurity is
- Learn the Importance of Cybersecurity
- Differentiate Networking Devices such as Router and Switch
- Differentiate IP, MAC, and PORT Address
- Define DNS and VPN
- Learn Hacking and the different Types of Hackers
- Learn the fundamentals of networking
- Discuss the layers of the OSI Model
- Explain the different networking protocols such as TCP, HTPP, UDP, ARP, and DHCP
- How to troubleshoot a network
- Learn the different types of attacks
- Know the different types of malware
- Explain the Man in the Middle and Denial of Service Attack
- Discuss what is Distributed Denial of Service Attack
- How to recognize Sniffing, Phishing, SQL Injection, Cross-site Scripting, and Post Scanning Attack
- Define Cryptography and why we need it
- Discuss important terminologies in Cryptography
- Know the different types of ciphers
- Learn the advantages and disadvantages of Symmetric and Asymmetric Keys
- Learn what is Digital Signature and the Signing and Verification Process
- Know how to check the Integrity of a Message
- Discuss the different security measures
- Learn the various types of firewalls
- Learn Cyber Law and why there is a need for it
- Discuss the classifications of cyber crime
- Definition, Process, and Types of Digital Forensics
- Create KALI Linux Virtual Machine in VMWARE
Course content
3030 sections • 212 lectures • Total duration 16 h 57 min