-
Module 1 - Introduction to Cybersecurity 5
-
Introduction 01 minLecture1.1
-
Course Outline 09 minLecture1.2
-
What-is-Cybersecurity 10 minLecture1.3
-
Importance-of-Cybersecurity 04 minLecture1.4
-
Cybersecurity-Frameworks 06 minLecture1.5
-
-
Module 2 - Networking Fundamentals 4
-
Data-Transmission-Models 04 minLecture2.1
-
Networking-Models 12 minLecture2.2
-
IP Addresses-and-Subnetting 09 minLecture2.3
-
Network-Devices 04 minLecture2.4
-
-
Module 3 - Cryptography 3
-
Introduction-to-Cryptography 05 minLecture3.1
-
Symmetric-and-Asymmetric-Encryption 06 minLecture3.2
-
Hashing-and-Digital-Signatures 06 minLecture3.3
-
-
Module 4 - Web Application Security 3
-
OWAPS Top’10-Common Web Vulnerabilities 21 minLecture4.1
-
Secure Coding Practices 03 minLecture4.2
-
Web Application Firewalls 03 minLecture4.3
-
-
Module 5 - Network Security 2
-
Module 6 - Malware Detection and Cyber Attacks 2
-
Malware and Types of Malware 08 minLecture6.1
-
Cyber Attacks and Types of Cyber Attacks 25 minLecture6.2
-
-
Module 7 - Incident Response and Threat Hunting 2
-
Incident Response and Management 08 minLecture7.1
-
Threat Hunting and Detection 03 minLecture7.2
-
-
Module 8 - Social Engineering and User Awareness Training 2
-
Types of Social Engineering Attacks 11 minLecture8.1
-
User Awareness Training 03 minLecture8.2
-
-
Module 9 - Access Control and Authentication Mechanisms 2
-
Access Control Models 10 minLecture9.1
-
Authentication Methods 09 minLecture9.2
-
-
Module 10 - Career Paths in Cybersecurity 1
-
Career Paths in Cybersecurity 14 minLecture10.1
-
This content is protected, please login and enroll course to view this content!

6 Comments
It’s nice and lovely learning from this organisation
Very educative. Thank you.
Very educative!!
Educative
It very nice
very educative