The Absolute Beginners Guide to Cyber Security - Part 1 | Alexander Oni | Skillshare

The Absolute Beginners Guide to Cyber Security - Part 1

Alexander Oni, Web Developer & Cyber Security Expert

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
49 Lessons (3h 12m)
    • 1. Promo

      2:32
    • 2. Welcome to the Course

      1:59
    • 3. Connect with Me

      1:25
    • 4. First things First

      4:20
    • 5. Difference Between Information and Cyber Security

      2:37
    • 6. The CIA Triad

      3:11
    • 7. The Security vs Ease of Access Paradox

      3:07
    • 8. Computer Protocols

      7:04
    • 9. TCPIP

      3:32
    • 10. World of Hacking Section Intro

      0:57
    • 11. What is NOT Hacking

      4:26
    • 12. Types of Hackers

      7:18
    • 13. Hacking Methodology

      3:47
    • 14. The WhoIS Query

      5:39
    • 15. Social Engineering

      3:36
    • 16. Attacks Section Intro

      0:49
    • 17. Brute Force Attacks

      4:17
    • 18. Phishing and Spoofing

      5:14
    • 19. Bots and Botnets

      3:27
    • 20. DoS and DDoS Attacks

      4:44
    • 21. Pings

      3:25
    • 22. Man in the Middle Attack

      4:18
    • 23. SQL Injection Attack

      5:01
    • 24. Malware Section Intro

      1:03
    • 25. Viruses and Worms

      4:51
    • 26. Trojans

      7:19
    • 27. Adware and Spyware

      3:59
    • 28. Ransomware

      7:15
    • 29. Other Types of Malware

      3:38
    • 30. Defences Section Intro

      0:42
    • 31. How an Antivirus Works

      4:34
    • 32. Encryption

      3:07
    • 33. Firewalls

      4:13
    • 34. Biometrics

      3:14
    • 35. Factor Authentication Methods

      4:54
    • 36. Honeypots and DMZs

      5:07
    • 37. Wireless Security

      2:08
    • 38. Password Management

      6:27
    • 39. BYOD

      3:06
    • 40. A Sample BYOD Policy

      6:15
    • 41. The Security vs Ease of Access Paradox

      3:07
    • 42. The Weakest Link and The Disgruntled Employee

      2:02
    • 43. Cyberwarfare

      2:25
    • 44. The Attack Against Estonia

      6:30
    • 45. Stuxnet The Attack Against Iran

      4:30
    • 46. The Sony Pictures Hack

      3:31
    • 47. The Weakest Link and The Disgruntled Employee

      2:02
    • 48. Biggest Myths of Online Security

      7:01
    • 49. Cyber Security Conclusion

      1:52
45 students are watching this class
How students rated this class
Leave Review

Watch more to review

We ask our students to watch a few lessons before reviewing to make sure we get quality feedback!

Best Suited for
 --  Beginner Intermediate Advanced Beginner/Intermediate Intermediate/Advanced All Levels

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

Be the first!

No ratings just yet—watch a few lessons to be the first to share whether this class met your expectations.

Expectations Met?
  • Exceeded!
    0%
  • Yes
    0%
  • Somewhat
    0%
  • Not really
    0%
Be the first to leave a review in our updated system!