4.58 out of 5
4.58
5808 reviews on Udemy

Cyber Security: From Beginner to Expert (2023)

Cyber Security made easy for absolute beginners - learn from an industry expert with PhD
Instructor:
Logix Academy
43,814 students enrolled
English [Auto] More
Security Governance, Network Security, Cyber Attacks, Web Application Security, Malware
Practical Cyber Security skills through hands on labs
Prepare for Cyber Security interviews by learning common interview questions and how to respond
Prepare for in-demand Cyber Security certifications such as CompTIA Security+ and CEH

A beginner level comprehensive course that includes step-by-step explanations of core security concepts along with follow-up quizzes and hands on labs to ensure a solid learning for the course taker.

Designed by a CyberSecurity expert with a PhD degree and premium Cybersecurity certifications, this course has been designed to make it extremely simple to learn complex Cyber Security concepts. Designed for beginner Cyber Security professionals, this course will help you master the major domains and launch a successful career in the Cyber Security industry. It is also a good starting point for students targeting Cyber Security certifications like CompTIA Security+ and CEH.

Please check out our free samples videos to see how complex concepts have been explained in an easy way!

Salient features include:

  • Step by step and easy to follow videos that don’t assume any prior knowledge

  • Hands on labs to develop practical skills required in jobs

  • Quizzes at the end of each section to test knowledge about each area

  • PhD instructor with 10+ years of industry experience as well as teaching experience

  • Sample interview questions and tips

  • CISSP certified instructor

  • 30 day money-back guarantee

Domains covered:

  • Foundations of Cybersecurity (CIA, Security Governance, Identity Federation, Cryptography, Hashing, Digital Signatures, Data Security)

  • Network Security (Primer on Computer Networks, Protocols, HTTPs, TLS/SSL, VPNs, IPSec, SSH, Firewalls, NAT, Port Scans)

  • Cyber Attacks (Man-in-the-Middle Attack, DoS/DDoS, Password Attacks, Social Engineering, Network Attacks)

  • Web Application Security (Web App Architecture, SQL Injections, Blind SQL Injections, Cross-Site Scripting)

  • Malware (Viruses, Worms, Trojans, Spyware, Adware, Ransomware, Logic Bombs and Root kits, Anti-malware)

Unlike other courses, this is a comprehensive course that covers both theory and practice.

Our 6 hands-on labs will teach you skills which you can directly use in your job:

  • Practice cryptography by generating public-private keys using RSA, encrypt data using public key and decrypt using private key

  • Employ hashing to verify the integrity of received data by leveraging MD5 hashing algorithm

  • Spot phishing emails, investigate whether the links or attachments are malicious and if you should block the domain

  • Carry out port scanning and discover which services are running on your web server

  • Carry out an actual SQL injection attack on a website and learn how to prevent these attacks

  • Carry out a blind SQL injection attack on a website by leveraging boolean and time-base inference techniques

Foundations

1
Welcome to the Course
2
The CIA Triad
3
Practice Activity: The CIA Triad
4
Identity and Access Management I
5
Identity and Access Management II
6
Identity Federation
7
Security Governance: Policies, Standards and Procedures
8
Security Governance: GDPR, HIPAA, PCI-DSS and Intellectual Property
9
Cryptography

After completing the lecture, please download the practice activity in the next lecture.

10
Practice Activity: Cryptography
11
Hashing and Digital Signatures
12
Lab: Hashing

Practice Activity: Please try the lab first then try the Practice Activity in the next lecture.

13
Practice Activity: Hashing
14
Quiz (Foundations)

Network Security

1
Introduction: OSI and TCP/IP
2
Application and Transport Layers
3
DNS (Domain Name System)
4
The Network Layer
5
The Link Layer
6
Security Protocols: SSL/TLS, IPSec, VPNs, SSH
7
Lab Setup

Lab setup instructions for setting up the Kali Linux Virtual Machine for VirtualBox or VMware

8
Lab: Port Scanning
9
NAT: Network Address Translation
10
Firewalls
11
Wireless Networks and Security
12
Quiz (Network Security)

Hacker Attacks

1
Password Attacks
2
DoS and DDoS
3
DNS Attacks
4
Network Attacks
5
Man in the Middle Attack
6
Social Engineering
7
Lab (no installation required): Phishing Attack and Investigation
8
Quiz (Cyber Attacks)

Web Application Security

1
Web Application Architecture
2
SQL Injection
3
Lab: SQL Injection
4
Blind SQL Injection
5
Lab: Blind SQL Injection
6
Mitigating SQL Injection Attacks
7
XSS: Cross Site Scripting
8
Vulnerability Management
9
Quiz (Web Application Security)

Malware

1
Malware: Introduction
2
Viruses and Worms
3
Trojans
4
Spyware, Adware and Ransomware
5
Logic Bombs and Rootkits
6
Antimalware
7
Quiz (Malware)

Interview Questions and Conclusion

1
Interview Questions and Conclusion

Bonus Section

1
Bonus Lecture
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.6
4.6 out of 5
5808 Ratings

Detailed Rating

Stars 5
3217
Stars 4
2083
Stars 3
438
Stars 2
59
Stars 1
24