About This Course
Course Curriculum
-
Network Topologies
00:06:00 -
History and Applications of Computer Networking
00:06:00 -
Protocols and Standards
00:04:00 -
Introduction to OSI Model
00:04:00 -
Layers of OSI Model
00:07:00 -
Introduction to TCP/IP Model
00:10:00 -
OSI Model vs TCP/IP Model
00:04:00 -
Addressing in Computer Networks
00:09:00 -
IP Address- IPv4 and IPv6
00:07:00 -
Classes of IP Address
00:10:00 -
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS
00:03:00 -
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS
00:05:00 -
The Internet Protocol (IP)
00:07:00 -
Address Resolution Protocol (ARP)
00:09:00 -
Dynamic Host Configuration Protocol (DHCP)
00:08:00 -
Internet Control Message Protocol (ICMP)
00:06:00 -
RIP and OSPF Protocols
00:05:00 -
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT
00:03:00 -
What are Sockets?
00:05:00 -
File Transfer Protocol (FTP)
00:03:00 -
Hypertext Transfer Protocol (HTTP)
00:04:00 -
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS)
00:05:00 -
Domain Name System (DNS)
00:03:00
-
Definition of Computer Security
00:03:00 -
Interesting Facts about Cyber Security
00:05:00 -
History of Cyber Security
00:07:00 -
Scope and Career Insights in Cyber Security
00:08:00
-
Introduction
00:01:00 -
Types of Computer Security
00:03:00 -
Key Terms in Cyber Security
00:07:00 -
The Elements of Information Security
00:06:00 -
Types of Attacks
00:10:00 -
Roles in Cyber Security : Part 1
00:08:00 -
Roles in Cyber Security : Part 2
00:06:00
-
Security Architect’s View of Security
00:08:00 -
What is Vulnerability Assessment?
00:05:00 -
4 Phases of Vulnerability Assessment
00:09:00 -
Introduction to Cryptography
00:06:00 -
Symmetric Encryption
00:03:00 -
Asymmetric Encryption
00:04:00 -
Hashing
00:07:00 -
Security Organizations
00:05:00 -
Critical Thinking in Cyber Security
00:04:00 -
The Five Critical Thinking Skills
00:06:00 -
PRACTICAL : USING NSLOOKUP TOOL
00:03:00
-
Different types of Actors in Cyber Security
00:10:00 -
Types of Cyber Attacks
00:04:00 -
Hacking Organizations around the Globe
00:05:00 -
Security Services and Mechanisms
00:03:00 -
Introduction to Threats
00:03:00 -
What is a Malware?
00:07:00 -
Types of Trojans
00:06:00 -
Types of Virus
00:07:00 -
Have you ever heard about a Ransomware?
00:09:00 -
The Cyber Kill Chain
00:09:00 -
Introduction to Social Engineering
00:05:00 -
Types of Social Engineering
00:07:00
-
Confidentiality – The Most Important Element of Security
00:04:00 -
Introduction to Incident Response Team
00:05:00 -
Phases of Incident Response
00:05:00 -
Laws in Cyber Security
00:05:00 -
What are Audits in Cyber Security
00:04:00 -
Internal Audit vs External Audit
00:04:00 -
The NIST Framework
00:03:00 -
The COBIT Framework
00:04:00
-
Intrusion Detection System
00:05:00 -
Introduction to Firewalls
00:05:00 -
What is DMZ?
00:04:00 -
Different types of Firewalls
00:09:00
-
Assignment – Cyber Security
07:36:00
-
Order Your Certificate