Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity 101
00 First Stop About the Course
00.00 Welcome to Cyber 101 (2:10)
00.01 Meet Your Professor! (3:00)
00.02 Course Expectations and Schedule (7:07)
00.03 Lab Environments (7:29)
00.04 How to Ace This Course! (4:02)
00.05 Key Terminology Reference
01 Setting the Cyber Stage
01.01 Module Introduction (5:40)
01.02 Why Have Cybersecurity At All? (10:29)
01.03 Different Roles in Cybersecurity (19:08)
01.04 20 Cybersecurity Jobs Explained (16:35)
01.05 People, Process, and Technology (9:39)
01.06 Knowledge Assessment
01.07 Additional Digging (2:10)
02 Technology Primer
02.01 Module Introduction (3:07)
02.02 Networking (10:48)
02.03 Operating Systems (23:32)
02.04 Cloud (13:26)
02.05 Software (12:26)
02.06 Lab - Using a Terminal (Command Line Shell) (36:58)
02.07 Knowledge Assessment
02.08 Additional Digging (3:23)
03 People Primer
03.01 Module Introduction (3:36)
03.02 Threat Actors (18:03)
03.03 Security Operations (12:31)
03.04 End Users (6:16)
03.05 Third Party Players (6:59)
03.06 Public Entities (11:54)
03.07 Knowledge Assessment
03.08 Additional Digging (3:46)
04 Threat Actor Workflows
04.01 Module Introduction (1:41)
04.02 Cyber Kill Chain (16:07)
04.03 Social Engineering (12:08)
04.04 Phishing (7:16)
04.05 Exploitation (12:43)
04.06 Persistence (13:26)
04.07 Privilege Escalation and Lateral Movement (20:41)
04.08 Actions on Objective (10:26)
04.09 Lab - Using Nmap for network and system reconnaissance (30:19)
04.10 Knowledge Assessment
04.11 Additional Digging
05 Weaponizing the Internet for Scams
05.01 Module Introduction (5:12)
05.02 Motivations (6:50)
05.03 Romance and Cryptocurrency Scams (21:23)
05.04 Business Email Compromise (15:48)
05.05 Sexploitation (12:39)
05.06 Lab - Phishing Toolkit to Harvest Credentials (14:10)
05.07 Knowledge Assessment
05.08 Additional Digging
06 Availability Attacks
06.01 Module Introduction (2:55)
06.02 Why and What is Denial of Service Attacks (28:28)
06.03 History of DoS Attacks (22:44)
06.04 How Modern DDoS Attacks Work (18:36)
06.05 Lab Explanation - Denial of Service
06.06 Knowledge Assessment
06.07 Additional Digging
07 Malicious Software
07.01 Module Introduction (4:06)
07.02 What is Malware? (29:01)
07.03 History of Malware (20:35)
07.04 What are Common Malwares (28:33)
07.05 Lab - Deploying and Detecting Rootkit Malware (24:45)
07.06 Knowledge Assessment
07.07 Additional Digging
08 Enterprise Security Solutions
08.01 Module Introduction (2:32)
08.02 What and Why is Defender Tech/Ops? (17:04)
08.03 Firewalls (17:05)
08.04 Endpoint Detection and Response EDR (20:46)
08.05 Mobile Device Management MDM (13:26)
08.06 Email Security Gateway (22:25)
08.07 Attack Emulation (21:03)
08.08 Security Incident and Event Management (SIEM) (20:55)
08.09 Lab - Configuring a Firewall (18:30)
08.10 Knowledge Assessment
08.11 Additional Digging
09 Espionage (Stealing Secrets)
09.01 Module Introduction (2:08)
09.02 What is Espionage? (16:31)
09.03 Tools for Espionage (15:18)
09.04 Government and Corporate Espionage Case Studies (12:59)
09.05 Defending From Espionage (10:06)
09.06 Lab - Hiding Data in Pictures with Stegnography (22:13)
09.07 Knowledge Assessment
09.08 Additional Digging
10 Governance, Risk, and Compliance (GRC)
10.01 Module Introduction (3:11)
10.02 What is GRC and Why Does It Matter? (16:58)
10.03 What are GRC Frameworks and How Do You Use Them (17:18)
10.04 Policies (and Their Failings) (13:09)
10.05 Lab - System Auditing with Lynis (17:16)
10.06 Knowledge Assessment
10.07 Additional Digging
11 Cryptography
11.01 Module Introduction (2:22)
11.02 What Is Cryptography and Why Should You Care (17:16)
11.03 Cryptography Through History (13:35)
11.04 Modern Cryptography (13:42)
11.05 Lab - Generate Your Own Public/Private Keys and Use Them (12:47)
11.06 Knowledge Assessment
11.07 Additional Digging
12 Vulnerability Management
12.01 Module Introduction (3:04)
12.02 What Is Vulnerability Management and Why Should You Care (21:59)
12.03 How Vulnerabilities are Discovered (17:28)
12.04 Bug Bounty Platforms and Responsible Disclosure (20:17)
12.05 Security Vulnerabilities and Patching (18:41)
12.06 Why Is Vulnerability Management Hard (12:06)
12.07 Lab - Vulnerability Scanning a System (17:33)
12.08 Knowledge Assessment
12.09 Additional Digging
13 Cyber as a Military Capability
13.01 Module Introduction (4:05)
13.02 What Is Cyber Warfare and Why Should You Care (10:51)
13.03 History of Cyber Warfare (22:53)
13.04 Advanced Persistent Threats (APT) (13:33)
13.05 Russian Ukrainian Conflict Cyber War Case Study (20:19)
13.06 Lab - Brute Forcing Access with Hydra (46:13)
13.07 Knowledge Assessment
13.08 Additional Digging
14 Cybersecurity Career Knowledge
14.01 Module Introduction (4:46)
14.02 Certifications (Which, How To Study, How to Navigate) (12:55)
14.03 LinkedIN (Professional Profiles) (9:07)
14.04 How to professionally network (31:20)
14.05 Conferences and Orgs (25:45)
14.06 Lab (LinkedIn Profile) (44:24)
14.07 Additional Digging
15 Course Conclusion
15.01 Knowledge Recap and How It Ties Together (10:11)
15.02 Next Steps For You
15.03 Leave Feedback 💙
11.05 Lab - Generate Your Own Public/Private Keys and Use Them
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock