Cyber Security Training for Beginners - Full Course
In this Computer security course, we'll learn everything about Cyber Security. Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
This cybersecurity course is for beginners who would like to kickstart their cyber security career.
1 - Avoiding Plagiarism
A brief introduction to plagiarism. This video gives some tips for avoiding plagiarism of ideas and language.
2 - Why Study Cyber Security
Sketches some reasons why everyday people would want to study cyber security.
3 - Cyber Security Terminology
Presents new vocabulary terms in context with true stories about cyber attacks.
4 - Demystifying Computers
Identifies the basic parts of a computer in plain English. Describes four layers of a computer system: Users, Hardware, Operating System, Applications
Describes what happens when users turn on a computer and when they run an application.
5 - Demystifying the Internet
Introduces some helpful concepts for understanding the Internet.
Describes the basic structure of the whole Internet. Also describes the basic structure of small, individual networks like home wireless networks or office networks.
Describes how information is routed across the Internet.
6 - Passwords and Hash Functions
Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.
7 - Common Password Threats
8 - Creating Strong Passwords
Provides tips for creating strong, memorable passwords.
9 - Managing Passwords
Provides tips for managing passwords
10 - How Email Works
Describes the paths that emails follow across the Internet.
11 - Email Security
Discusses six common email threats: Eavesdropping, Spamming and Phishing, Spoofing, Malicious Email Attachments, Replying and Forwarding Issues, Carbon Copy (CC) and Blind Carbon Copy (BCC) Issues
12 - Varieties of Malware
Introduces four different kinds of malware: Viruses, Worms, Trojan Horses, Bots
13 - Functions of Malware
Describes seven common functions of malware
14 - Sources of Malware
Describes eight common sources of malware
15 - Layers of Defense Against Malware
Describes five layers of defense against malware
16 - How Web Browsing works
An introduction explaining how computers interact with the web.
17 - Safely Navigating the Web
Discusses four web safety issues
18 - Online Shopping
Addresses eleven security issues for online shopping
19 - Wireless Network Basics
Provides a few brief notes on how wireless networks work.
20 - Wireless Internet Security Threats
Notice: We recommend that an adult screen this video before sharing it with young children. The fourth section of this video contains a passing reference to a serious and potentially frightening cyber crime.
21 - Using Public Wireless Networks
Shares five tips for safer browsing on public WiFi
22 - Administering Wireless Networks
Covers six tips for administering a home wireless network
23 - Social Media and Privacy
Addresses three privacy considerations for social media users
24 - Describes two security issues for users of social media: Burglars on Social Media, Phishing Scams and Malware on Social Media
25 - Social Engineering
Describes four common social engineering threats
26 - Reading URLs
Being able to read URLs helps web users to verify that they are visiting authentic web pages instead of malicious counterfeits.
27 - Interpersonal Issues Online
Describes five common interpersonal issues that web users should be aware of:
1. Anonymity
2. Missing the Communication Context
3. Privacy
4. Everlasting Information
5. Credibility
#CyberSecurity #Security #Morioh
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
Original video by IowaCyber
278
views
7 hottest Cyber Security Documentaries 2021
Getting started in Cyber security, here are 7 documentaries to get you excited. Learn How Attributions work and the potential effects it has to the relationship with other countries for getting it wrong , get to know the history cyber security attacks and repeated events, explore the world of digital espionage and reckon. 😶
🔐 In Cyber Security you have to get it right all the time but the attacker only has to get it right once. 🔓
✅ Subscribe for More :
🎥 : The Great Hack
🎥 : The New York Times Presents : The Teenager who Hacked Twitter
🎥 : Zero Days
🎥 : Hacker : Hunter Olympic Destroyer
🎥 : Cyberwar : Vice
14
views
CYBERSECURITY for BEGINNERS FULL COURSE | Cyber Security Full Course
CYBERSECURITY for BEGINNERS FULL COURSE | Cyber Security Full Course
11
views
2
comments
Chat with a Cybersecurity Recruiter
NOTE: The Bsides Resume Review Workshop mentioned was actually hosted by Kathleen Smith with CyberSecJobs. www.cybersecjobs.com Kudos to her and that team for a helpful workshop!
6
views
The eLearnSecurity/INE Shift (Cyber Security Pass)
To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and documentation.
https://www.kite.com/
7
views
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation.
https://www.kite.com/
4
views
The Cyber Security Survival Guide for Startups
Cyber security has been a hot potato referring to recent security breaches facing big companies and personal information violations. The importance of cybersecurity in a startup can’t be underestimated either. When running a startup, it is vital to know and identify the possible threats the cyber space holds in it. CEO at HackerOne Mårten Mickos, Jesse Kinser, the Director of Product Security at LifeOmic and Frans Rosén, Security Advisor at Detectify will let you in their mindset of operating a hack-free startup: from how to get started to operating a fast scaling business.
--
In 2018, Slush brought together 20,000 attendees, including 3,100 startups, 1,800 investors and 650 journalists from over 130 countries. The cold and dark Helsinki welcomed these tech-heads to celebrate on Dec 3-5, 2018 with hundreds of side-events and activities around the city.
5
views
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity
The National Security Agency (NSA) has authorities for both foreign intelligence and cyber security. This unique position gives NSA insights into the ways networks are exploited and the methods that are effective in defending against threats. Over time, NSA has adapted the focus of its security efforts and continues to evolve with technologies and the adversaries we face. The talk will look back at some of the inflection points that have influenced NSA and US Government cybersecurity efforts and look at what is necessary to stay safe in the new environment.
6
views