Premium Only Content
Cyber Security Training for Beginners - Full Course
In this Computer security course, we'll learn everything about Cyber Security. Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
This cybersecurity course is for beginners who would like to kickstart their cyber security career.
1 - Avoiding Plagiarism
A brief introduction to plagiarism. This video gives some tips for avoiding plagiarism of ideas and language.
2 - Why Study Cyber Security
Sketches some reasons why everyday people would want to study cyber security.
3 - Cyber Security Terminology
Presents new vocabulary terms in context with true stories about cyber attacks.
4 - Demystifying Computers
Identifies the basic parts of a computer in plain English. Describes four layers of a computer system: Users, Hardware, Operating System, Applications
Describes what happens when users turn on a computer and when they run an application.
5 - Demystifying the Internet
Introduces some helpful concepts for understanding the Internet.
Describes the basic structure of the whole Internet. Also describes the basic structure of small, individual networks like home wireless networks or office networks.
Describes how information is routed across the Internet.
6 - Passwords and Hash Functions
Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.
7 - Common Password Threats
8 - Creating Strong Passwords
Provides tips for creating strong, memorable passwords.
9 - Managing Passwords
Provides tips for managing passwords
10 - How Email Works
Describes the paths that emails follow across the Internet.
11 - Email Security
Discusses six common email threats: Eavesdropping, Spamming and Phishing, Spoofing, Malicious Email Attachments, Replying and Forwarding Issues, Carbon Copy (CC) and Blind Carbon Copy (BCC) Issues
12 - Varieties of Malware
Introduces four different kinds of malware: Viruses, Worms, Trojan Horses, Bots
13 - Functions of Malware
Describes seven common functions of malware
14 - Sources of Malware
Describes eight common sources of malware
15 - Layers of Defense Against Malware
Describes five layers of defense against malware
16 - How Web Browsing works
An introduction explaining how computers interact with the web.
17 - Safely Navigating the Web
Discusses four web safety issues
18 - Online Shopping
Addresses eleven security issues for online shopping
19 - Wireless Network Basics
Provides a few brief notes on how wireless networks work.
20 - Wireless Internet Security Threats
Notice: We recommend that an adult screen this video before sharing it with young children. The fourth section of this video contains a passing reference to a serious and potentially frightening cyber crime.
21 - Using Public Wireless Networks
Shares five tips for safer browsing on public WiFi
22 - Administering Wireless Networks
Covers six tips for administering a home wireless network
23 - Social Media and Privacy
Addresses three privacy considerations for social media users
24 - Describes two security issues for users of social media: Burglars on Social Media, Phishing Scams and Malware on Social Media
25 - Social Engineering
Describes four common social engineering threats
26 - Reading URLs
Being able to read URLs helps web users to verify that they are visiting authentic web pages instead of malicious counterfeits.
27 - Interpersonal Issues Online
Describes five common interpersonal issues that web users should be aware of:
1. Anonymity
2. Missing the Communication Context
3. Privacy
4. Everlasting Information
5. Credibility
#CyberSecurity #Security #Morioh
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
Original video by IowaCyber
-
1:15:40
Man in America
15 hours agoThe DISTURBING Truth: How Seed Oils, the Vatican, and Procter & Gamble Are Connected w/ Dan Lyons
115K113 -
6:46:07
Rance's Gaming Corner
16 hours agoTime for some RUMBLE FPS!! Get in here.. w/Fragniac
157K3 -
1:30:48
Josh Pate's College Football Show
16 hours ago $10.57 earnedCFP Reaction Special | Early Quarterfinal Thoughts | Transfer Portal Intel | Fixing The Playoff
93.6K1 -
23:55
CartierFamily
3 days agoElon & Vivek TRIGGER Congress as DOGE SHUTS DOWN Government
130K152 -
5:43:44
Scammer Payback
2 days agoCalling Scammers Live
223K30 -
18:38
VSiNLive
2 days agoProfessional Gambler Steve Fezzik LOVES this UNDERVALUED Point Spread!
160K20 -
LIVE
Right Side Broadcasting Network
10 days agoLIVE REPLAY: President Donald J. Trump Keynotes TPUSA’s AmFest 2024 Conference - 12/22/24
3,219 watching -
4:31
CoachTY
1 day ago $28.83 earnedCOINBASE AND DESCI !!!!
196K13 -
10:02
MichaelBisping
1 day agoBISPING: "Was FURY ROBBED?!" | Oleksandr Usyk vs Tyson Fury 2 INSTANT REACTION
116K16 -
8:08
Guns & Gadgets 2nd Amendment News
2 days ago16 States Join Forces To Sue Firearm Manufacturers Out of Business - 1st Target = GLOCK
135K93