What you'll learn Understand the Fundamentals of Cyber Security Threats & Countermeasures Have a Strong Fundamental Understanding of Cyber Security Be Prepared for More Advanced Cyber Security Courses Better Protect Your Business & I.T. Infrastructure
Requirements Understand the Fundamentals of Cyber Security Threats & Countermeasures Have a Strong Fundamental Understanding of Cyber Security Be Prepared for More Advanced Cyber Security Courses Better Protect Your Business & I.T. Infrastructure
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4
22.4 MB
~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4.jpg
140.2 KB
~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.srt
6.1 KB
~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.mp4
14.7 MB
~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.srt
4 KB
~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.mp4
15.9 MB
~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.srt
1.3 KB
~Get Your Files Here !/1. Course Introduction/3.1 Course Companion Study Guide.pdf
2.2 MB
~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.mp4
19.1 MB
~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.srt
1.5 KB
~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4
62.7 MB
~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.srt
11.3 KB
~Get Your Files Here !/1. Course Introduction/6. How to Access Course Subtitles & Transcripts.html
1 KB
~Get Your Files Here !/1. Course Introduction/7. Join our Facebook Student Community.html
1.1 KB
~Get Your Files Here !/1. Course Introduction/8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html
1.2 KB
~Get Your Files Here !/1. Course Introduction/9. Student Exercise Introduce Yourself.html
281 B
~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.mp4
10.6 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.srt
832 B
~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.mp4
23.1 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.srt
6.9 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.mp4
30.2 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.srt
8.8 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.mp4
31.1 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.srt
8.3 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.mp4
18.8 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.srt
5.7 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.mp4
28.8 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.srt
7.7 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.mp4
20.9 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.srt
6.9 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.mp4
21.6 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.srt
7.2 KB
~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.mp4
20.2 MB
~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.srt
1.7 KB
~Get Your Files Here !/11. Conclusion & Next Steps/2. How to Download Your Udemy Course Certificate of Completion.html
659 B
~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.mp4
10.7 MB
~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.srt
756 B
~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.mp4
24.4 MB
~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.srt
4.7 KB
~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.mp4
23.3 MB
~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.srt
7.7 KB
~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.mp4
55.7 MB
~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.srt
9.6 KB
~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.mp4
12.8 MB
~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.srt
1.1 KB
~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.mp4
40.2 MB
~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.srt
3.1 KB
~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.mp4
10.5 MB
~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.srt
3.5 KB
~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.mp4
18 MB
~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.srt
5.5 KB
~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.mp4
23.6 MB
~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.srt
11.2 KB
~Get Your Files Here !/4. Networking 101/1. Section Introduction.mp4
20.2 MB
~Get Your Files Here !/4. Networking 101/1. Section Introduction.srt
1.8 KB
~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4
34.1 MB
~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt
5.7 KB
~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.mp4
8.4 MB
~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.srt
2.9 KB
~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.mp4
9.4 MB
~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.srt
3 KB
~Get Your Files Here !/4. Networking 101/4. Computer Protocols.mp4
12.5 MB
~Get Your Files Here !/4. Networking 101/4. Computer Protocols.srt
4.2 KB
~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.mp4
18.3 MB
~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.srt
5.7 KB
~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.mp4
16.9 MB
~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.srt
4.9 KB
~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.mp4
27.8 MB
~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.srt
8 KB
~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.mp4
21.2 MB
~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.srt
5.5 KB
~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).mp4
26.8 MB
~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).srt
6.2 KB
~Get Your Files Here !/5. Malware Threats/1. Section Introduction.mp4
7.9 MB
~Get Your Files Here !/5. Malware Threats/1. Section Introduction.srt
687 B
~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.mp4
20.2 MB
~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.srt
6 KB
~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.mp4
14 MB
~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.srt
4.9 KB
~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.mp4
11 MB
~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.srt
4.3 KB
~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.mp4
28.5 MB
~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.srt
6.3 KB
~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.mp4
20.4 MB
~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.srt
5.4 KB
~Get Your Files Here !/5. Malware Threats/7. Case Study Colonial Pipeline.html
2.5 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.mp4
10 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.srt
877 B
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.mp4
15.1 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.srt
4 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.mp4
23.7 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.srt
6.7 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.mp4
31.1 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.srt
10.8 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.mp4
15.5 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.srt
4.8 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.mp4
20.9 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.srt