FUNDAMENTALS OF NETWORKING |
|
Network Topologies |
|
00:06:00 |
|
History and Applications of Computer Networking |
|
00:06:00 |
|
Protocols and Standards |
|
00:04:00 |
|
Introduction to OSI Model |
|
00:04:00 |
|
Layers of OSI Model |
|
00:07:00 |
|
Introduction to TCP/IP Model |
|
00:10:00 |
|
OSI Model vs TCP/IP Model |
|
00:04:00 |
|
Addressing in Computer Networks |
|
00:09:00 |
|
IP Address- IPv4 and IPv6 |
|
00:07:00 |
|
Classes of IP Address |
|
00:10:00 |
|
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS |
|
00:03:00 |
|
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS5 |
|
00:05:00 |
|
The Internet Protocol (IP) |
|
00:07:00 |
|
Address Resolution Protocol (ARP) |
|
00:09:00 |
|
Dynamic Host Configuration Protocol (DHCP) |
|
00:08:00 |
|
Internet Control Message Protocol (ICMP) |
|
00:06:00 |
|
RIP and OSPF Protocols |
|
00:05:00 |
|
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT |
|
00:03:00 |
|
What are Sockets? |
|
00:05:00 |
|
File Transfer Protocol (FTP) |
|
00:03:00 |
|
Hypertext Transfer Protocol (HTTP) |
|
00:04:00 |
|
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS) |
|
00:05:00 |
|
Domain Name System (DNS) |
|
00:03:00 |
GETTING STARTED WITH CYBER SECURITY |
|
Definition of Computer Security |
|
00:03:00 |
|
Interesting Facts about Cyber Security |
|
00:05:00 |
|
History of Cyber Security |
|
00:07:00 |
|
Scope and Career Insights in Cyber Security |
|
00:08:00 |
LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY |
|
Introduction |
|
00:01:00 |
|
Types of Computer Security |
|
00:03:00 |
|
Key Terms in Cyber Security |
|
00:07:00 |
|
The Elements of Information Security |
|
00:06:00 |
|
Types of Attacks |
|
00:10:00 |
|
Roles in Cyber Security : Part 1 |
|
00:08:00 |
|
Roles in Cyber Security : Part 2 |
|
00:06:00 |
DIVING DEEP INTO CYBER SECURITY |
|
Security Architect’s View of Security |
|
00:08:00 |
|
What is Vulnerability Assessment? |
|
00:05:00 |
|
4 Phases of Vulnerability Assessment |
|
00:09:00 |
|
Introduction to Cryptography |
|
00:06:00 |
|
Symmetric Encryption |
|
00:03:00 |
|
Asymmetric Encryption |
|
00:04:00 |
|
Hashing |
|
00:07:00 |
|
Security Organizations |
|
00:05:00 |
|
Critical Thinking in Cyber Security |
|
00:04:00 |
|
The Five Critical Thinking Skills |
|
00:06:00 |
|
PRACTICAL : USING NSLOOKUP TOOL |
|
00:03:00 |
TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES |
|
Different types of Actors in Cyber Security |
|
00:10:00 |
|
Types of Cyber Attacks |
|
00:04:00 |
|
Hacking Organizations around the Globe |
|
00:05:00 |
|
Security Services and Mechanisms |
|
00:03:00 |
|
Introduction to Threats |
|
00:03:00 |
|
What is a Malware? |
|
00:07:00 |
|
Types of Trojans |
|
00:06:00 |
|
Types of Virus |
|
00:07:00 |
|
Have you ever heard about a Ransomware? |
|
00:09:00 |
|
The Cyber Kill Chain |
|
00:09:00 |
|
Introduction to Social Engineering |
|
00:05:00 |
|
Types of Social Engineering |
|
00:07:00 |
KEY SECURITY CONCEPTS |
|
Confidentiality – The Most Important Element of Security |
|
00:04:00 |
|
Introduction to Incident Response Team |
|
00:05:00 |
|
Phases of Incident Response |
|
00:05:00 |
|
Laws in Cyber Security |
|
00:05:00 |
|
What are Audits in Cyber Security |
|
00:04:00 |
|
Internal Audit vs External Audit |
|
00:04:00 |
|
The NIST Framework |
|
00:03:00 |
|
The COBIT Framework |
|
00:04:00 |
FIREWALLS AND ANTIVIRUS |
|
Intrusion Detection System |
|
00:05:00 |
|
Introduction to Firewalls |
|
00:05:00 |
|
What is DMZ? |
|
00:04:00 |
|
Different types of Firewalls |
|
00:09:00 |
Assignment |
|
Assignment – Cyber Security |
|
Unlimited |
Order Your Certificate |
|
Order Your Certificate QLS |
|
00:00:00 |