Cyber Security Masterclass - All about IT Security Udemy
Price: USD 35
  • Duration: Flexible

Course details

Description

The objective of this course is to turn you into a cyber security specialist in under 8 hours.

Do you want to start a cyber security career?

Do you want to improve your cyber security skills?

Do you want to improve the IT security of your organization?

Do you want to review and pass the CompTIA Security+ exam?

THIS IS THE RIGHT CYBER SECURITY COURSE FOR YOU!

  • Learn what are the Cyber Security principles

  • How to measure security risks

  • The best Identity and Access Management to keep your users safe

  • Improve your password management and keep your passwords secure

  • Learn what is MFA

  • Learn how to keep away hackers and social engineering from getting sensitive files, emails, or access to your computer or network

  • Learn about cyber security awareness

  • Apply the most secure IT protocols and encryption methods

  • Keep your data protected with encryption

  • Learn about network models and IP models

  • Learn everything about Cryptography, Hashing and Digital Signatures

  • Learn how RSA and ECDSA works

  • Keep your infrastructure more secure

  • Data encryption

  • Prevent DDoS attacks

  • Learn about the different types of malware

  • Social engineering attacks and hot to prevent them

  • Phishing

  • Logging and monitoring tools

  • Improve your system resilience

  • Application Architecture and Infrastructure

  • The different types of cloud models: IaaS, PaaS, FaaS and SaaS

  • What is a VPC

  • Firewalls

  • Testing your applications for security

  • Learn how to securely develop an application

  • Learn how to respond to incidents

This course has over 6 hours of video plus 55 questions that will help you to better understand Cyber Security. If you are looking to take the Comptia Security+ exam, this will also be a good help.


This complete Cyber Security Course includes the following topics:

  • Cybersecurity Principles

  • The CIA triad

  • The AAA of security

  • Non-repudiation

  • Measuring risks

  • Governance and Procurement

  • Secure Protocols

  • Network Models

  • OSI vs TCP/IP Model

  • TCP/IP Model

  • Transport Protocols

  • IP Models

  • Application protocols and ports

  • Cryptography, hashing and digital signatures

  • Consensus mechanisms

  • Hashing

  • Digital signatures

  • Multi-signatures

  • Random numbers

  • Prime numbers

  • RSA

  • ECDSA

  • Quantum Computing

  • Infrastructure Security

  • Data Encryption

  • Denial of Service

  • Man-in-the-middle attack

  • Attacking applications

  • Malware

  • Virus

  • Adware

  • Spyware

  • Trojan horses

  • Ransomware

  • Logic Bombs

  • Rootkit and backdoors

  • Polymorphic Malware, Keyloggers and Armored Viruses

  • Social engineering attacks

  • Logging and Monitoring

  • System Resiliency

  • Redundancy

  • Backups

  • Snapshots

  • High Availability

  • Disaster Recovery

  • Infrastructure hardening

  • Application Architecture and Infrastructure

  • Cloud models

  • VPCs

  • NACLs

  • Network Firewalls

  • Testing your application

  • Testing your infrastructure

  • Other security practices

  • Secure DevOps

  • Secure Development and Deployment

  • Incident Detection and Response

  • Contingency Planning

Updated on 02 May, 2023
Courses you can instantly connect with... Do an online course on Cybersecurity starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or