Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.

The Absolute Beginners Guide to Information & Cyber Security

Alexander Oni, The Web Monkey Academy

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
46 Videos (3h 2m)
    • Promo

      2:32
    • Welcome to the Course

      1:59
    • SkillShare Tips

      1:19
    • Difference Between Information and Cyber Security

      2:37
    • The CIA Triad

      3:11
    • Computer Protocols

      7:04
    • TCPIP

      3:32
    • World of Hacking Section Intro

      0:57
    • What is NOT Hacking

      4:26
    • Types of Hackers

      7:18
    • Hacking Methodology

      3:47
    • The WhoIS Query

      5:39
    • Social Engineering

      3:36
    • Attacks Section Intro

      0:49
    • Brute Force Attacks

      4:17
    • Phishing and Spoofing

      5:14
    • Bots and Botnets

      3:27
    • DoS and DDoS Attacks

      4:44
    • Pings

      3:25
    • ManintheMiddle Attack

      4:18
    • SQL Injection Attack

      5:01
    • Malware Section Intro

      1:03
    • Viruses and Worms

      4:51
    • Trojans

      7:19
    • Adware and Spyware

      3:59
    • Ransomware

      7:15
    • Other Types of Malware

      3:38
    • Defences Section Intro

      0:42
    • How an Antivirus Works

      4:34
    • Encryption

      3:07
    • Firewalls

      4:13
    • Biometrics

      3:14
    • Factor Authentication Methods

      4:54
    • Honeypots and DMZs

      5:07
    • Wireless Security

      2:08
    • Password Management

      6:27
    • BYOD

      3:06
    • The Security vs Ease of Access Paradox

      3:07
    • The Weakest Link and The Disgruntled Employee

      2:02
    • Cyberwarfare

      2:25
    • The Attack Against Estonia

      6:30
    • Stuxnet The Attack Against Iran

      4:30
    • The Sony Pictures Hack

      3:31
    • Biggest Myths of Online Security

      7:01
    • A Sample BYOD Policy

      6:15
    • Conclusion

      1:48