categories: Technology, Science & Productivity
How cybersecurity works, what the importance of cybersecurity is, and what the different types of security breaches are and how to deal with them.
How Kali Linux works, what the difference between web security and network security is, and what digital forensics is and what the skills required for it are.
How malware analysis and reverse engineering work and how you can apply what you will learn about them in order to protect yourself from cyber attacks.
Free lessons
Introduction
Cyber security overview
Building our labs/ tools
1. Introduction to Cybersecurity
Introduction
Cyber security overview
Building our labs/ tools
Kali Linux Intro 1
Kali Linux Intro 2
Web Security 1
Web Security 2
Introduction to Hypertext Transfer Protocol
Web Browser Is Your Weapon
Cookies
Admin Has The Power
Digital Forensics
Skills Required For Digital Forensics
File Analysis
Search In Trash
Network Security
Wireshark
Networkminer
Bflag 1
Bflag 2
Malware Analysis and Reverse Engineering
SW Reverse Engineering
Reverse Engineering Tools
Assembly/ Machine Code
Registers
Getting Started Challenge
The Debugger
With the increase of cyberattacks, a need for more accurate and robust security and protection strategies has emerged and created the idea of cybersecurity. This course introduces the concept of cybersecurity and the importance of its role in protecting cyberspace. This course will address the mechanisms and methods that cybersecurity professionals use to safeguard the data of individuals, organizations, and countries. You will also be prepared to understand the mindset of hackers, and how to protect data on various devices.
Additional tools to install will be mentioned throughout the course. No prior knowledge of or experience with these tools is needed.
Cybersecurity Technical Leader
1,713 Learners
1 Course