Overview
Kickstart a financially secure career by learning about cybersecurity, with the Cyber Security Complete Bundle course.
The significance of cybersecurity has been increasing worldwide because of the increasing rate of cybercrime. For that reason, cybersecurity experts are in huge demand and some of the highest-paid professionals in the IT sector. This challenging yet fascinating Cyber Security Complete Bundle course explores all the critical topics of cybersecurity concepts, and will equip you with the skills you need to leap up the career ladder.
How will I get my certificate?
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
Who is this course for?
There is no experience or previous qualifications required for enrolment on this Cyber Security Complete Bundle. It is available to all students, of all academic backgrounds.
Requirements
Our Cyber Security Complete Bundle is fully compatible with PC’s, Mac’s, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace.
Career path
Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc.
Course Curriculum
- 8 sections
- 45 lectures
- 00:00:00 total length
-
A warm welcome to this course
00:02:00 -
What is Cybersecurity
00:01:00 -
Difference between Information Security and Cyber Security
00:02:00 -
The 3 Principles Of Cyber Security
00:05:00 -
Computer protocols 1
00:04:00 -
Computer Protocol 2
00:02:00 -
What is SSL, TLS, HTTPS, SSH
00:04:00 -
Heartbleed Vulnerability
00:04:00 -
Web browsers in security
00:03:00 -
Safe & Free Extensions For Browser Security Part-1
00:05:00 -
Safe & Free Extensions For Browser Security Part-2
00:03:00
-
Top 5 Hollywood Movies on Hacking
00:04:00 -
What is Hacking
00:03:00 -
Types Of Hackers
00:04:00 -
WHOIS QUERY
00:04:00 -
Social Engineering
00:04:00
-
Phishing
00:05:00 -
Brute Force Attack (BFA)
00:03:00 -
DOS And DDOS
00:04:00 -
Botnets
00:03:00 -
MITM
00:03:00 -
IP SPOOFING
00:02:00 -
URL Spoofing
00:02:00 -
SQL Injection
00:00:00 -
Ldap Injections
00:03:00
-
What is Malware
00:01:00 -
Virus vs Worms
00:03:00 -
Polymorphic virus
00:01:00 -
Trojan
00:03:00 -
Ransomware
00:04:00 -
Spyware
00:02:00 -
Rootkits
00:02:00
-
2020-09-24 155046 – Introduction
00:01:00 -
Digital Wallets
00:04:00
-
Antivirus
00:04:00 -
FIREWALL
00:02:00 -
Encryption
00:04:00 -
2 Factor Authentication
00:02:00 -
Honey Pots & DMZ
00:02:00
-
Introduction ( BARTER SYSTEM )
00:03:00 -
Email vs Traditional Mail
00:02:00 -
Process Of Sending an Email
00:02:00 -
Security Threats for Email
00:03:00 -
Defense Against It
00:03:00
-
Busting Some Cyber Security Myths
00:05:00