About Course
Domain 1: Security Principles we cover:
1.1 Understand the security concepts of information assurance
1.2 Understand the risk management process
1.3 Understand security controls
1.4 Understand ISC2 Code of Ethics
1.5 Understand governance processes
Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts we cover:
2.1 Understand business continuity (BC)
2.2 Understand disaster recovery (DR)
2.3 Understand incident response
In Domain 3: Access Controls Concepts we cover:
3.1 Understand physical access controls
3.2 Understand logical access controls
Domain 4: Network Security we cover:
4.1 Understand computer networking
4.2 Understand network threats and attacks
4.3 Understand network security infrastructure
Domain 5: Security Operations we cover:
5.1 Understand data security
5.2 Understand system hardening
5.3 Understand best practice security policies
5.4 Understand security awareness training
What Will You Learn?
- Gain the knowledge for entry level IT, Cyber Security, roles and job interviews.
- Prepare for in-demand Cyber Security entry level certifications like Certified in Cybersecurity (CC), CSX-P, or ITCA.
- Get started on or take your Cyber Security career to the next level! Get the tools to start or grow your Cyber Security career.
- Understand and be able to explain: Security Principle, Business Continuity Planning (BCP), Disaster Recovery Planning (DRP) and Incident Response Concepts.
- Understand and be able to explain: Access Controls Concepts, Network Security, Security Operations, and much more.
- Understand and be able to explain: The CIA triad, IAAA, Risk Management, Organizational/IT/Cyber Security Governance.
- Understand and be able to explain: Physical/logical access control, Disaster planning/recovery, Cryptography, Network Security, Malware, and much more.
- Understand and be able to explain: Cyber Security, Information, and IT Security.
Course Content
Introduction
-
Introduction to Cybersecurity Fundamentals
01:45:00 -
Cybersecurity Tools
01:14:00
Security Principles
-
How does Firewall works – Demo
01:14:00 -
Operating System and Security – Linux
01:33:00 -
Linux Operating system Installation and Demo
01:23:00 -
Cybersecurity Tools and Threats
01:00:00 -
How Encryption Works – Demo
01:00:00 -
Introduction to Ethical Hacking
02:00:00 -
Ethical Hacking II
01:34:00 -
Web Application Security and Vulnerability
01:34:00 -
Web App Security II
43:00 -
Web App Security III
49:00 -
Web App Security IV
56:00 -
Web App Security V
54:00 -
Reconisance and Enumiration
01:00:00 -
Risk Management – part 1
-
Risk Management – part 2
-
Risk Management – part 3
-
Risk Management – part 4
-
Risk Management – part 5
-
Risk Management – part 6
-
Access Control Categories and Types – part 1
-
Access Control Categories and Types – part 2
-
The Ethics of your organizations and ISC2
-
Governance vs. Management
-
Laws and regulations – part 1
-
Laws and regulations – part 2
-
Security governance principles
Business Continuity, Disaster Recovery, and Incident Response
-
BCP – Business Continuity Planning – Part 1
-
BCP – Business Continuity Planning – Part 2
-
BCP – Business Continuity Planning – Part 3
-
DRP – Disaster Recovery Planning – Part 1
-
DRP – Disaster Recovery Planning – Part 2
-
DRP – Disaster Recovery Planning – Part 3
-
DRP – Disaster Recovery Planning – Part 4
-
Incidents Response – Part 1
-
Incidents Response – Part 2
-
Incidents Response – Part 3
-
Incidents Response – Part 4
-
Incidents Response – Part 5
Access Control Concepts
-
Physical Security – part 1
-
Physical Security – part 2
-
Physical Security – part 3
-
Physical Security – part 4
-
Physical Security – part 5
-
Logical Access Control – Part 1
-
Logical Access Control – Part 2
-
Logical Access Control – Part 3
-
Logical Access Control – Part 4
-
Logical Access Control – Part 5
Network Security
-
Network Basics and Definitions – Part 1
-
Network Basics and Definitions – Part 2
-
The OSI Model – Part 1
-
The OSI Model – Part 2
-
The TCP/IP model
-
IP addresses, port numbers, and MAC addresses – Part 1
-
IP addresses, port numbers, and MAC addresses – Part 2
-
IP addresses, port numbers, and MAC addresses – Part 3
-
IP support protocols – Part 1
-
IP support protocols – Part 2
-
Cables – part 1
-
Cables – part 2
-
LAN topologies
-
Wi-Fi
-
Wireless networks – Part 1
-
Wireless networks – Part 2
-
VLANs and Routers – Part 1
-
VLANs and Routers – Part 2
-
VPNs, NAC, and third-party connectivity
-
SDN, SD-WAN, and SDX
-
Attacks and attackers – Part 1
-
Attacks and attackers – Part 2
-
Attacks and attackers – Part 3
-
Intrusion Detection and Prevention systems (IDS-IPS) – Part 1
-
Intrusion Detection and Prevention systems (IDS-IPS) – Part 2
-
SIEM and SOAR systems
-
Honeynets and Honeypots
-
Firewalls – Part 1
-
Firewalls – Part 2
-
0-day Attacks and Exploits
-
Vulnerability Scanning
-
Virtualization, Cloud, and Distributed Computing – Part 1
-
Virtualization, Cloud, and Distributed Computing – Part 2
-
Virtualization, Cloud, and Distributed Computing – Part 3
-
Virtualization, Cloud, and Distributed Computing – Part 4
-
Virtualization, Cloud, and Distributed Computing – Part 5
-
The Internet of Things (IoT)
-
Asset tracking and hardware hardening
-
Electricity
-
Backups – Part 1
-
Backups – Part 2
-
Fault tolerance, redundancy, and resiliency – Part 1
-
Fault tolerance, redundancy, and resiliency – Part 2
-
Fault tolerance, redundancy, and resiliency – Part 3
-
Fire suppression – Part 1
-
Fire suppression – Part 2
-
Secure design principles – Part 1
-
Secure design principles – Part 2
Security Operations
-
Configuration Management
-
Patch Management.
-
Change Management
-
Cryptography – Part 1
-
Cryptography – Part 2
-
Cryptography – Part 3
-
Hashing
-
Attacks on our cryptography
-
Data handling, data storage and data retention – Part 1
-
Data handling, data storage and data retention – Part 2
-
Data handling, data storage and data retention – Part 3
-
Administrative (Directive) Controls
-
Training and awareness
-
Social Engineering attacks – Part 1
-
Social Engineering attacks – Part 2
Get Certified
-
Why you should get certified in cybersecurity
-
How to design your career and certificates to pursue