Welcome to Cyber 101
An introductory course designed to equip you with the foundational knowledge and skills needed to navigate the dynamic and essential field of cybersecurity.
Whether you're new to the world of cyber defense or looking to solidify your understanding of key concepts, this course is your gateway to becoming a proficient cybersecurity professional.
Cybersecurity 101 Curriculum
- 04.01 Module Introduction (1:41)
- 04.02 Cyber Kill Chain (16:07)
- 04.03 Social Engineering (12:08)
- 04.04 Phishing (7:16)
- 04.05 Exploitation (12:43)
- 04.06 Persistence (13:26)
- 04.07 Privilege Escalation and Lateral Movement (20:41)
- 04.08 Actions on Objective (10:26)
- 04.09 Lab - Using Nmap for network and system reconnaissance (30:19)
- 04.10 Knowledge Assessment
- 04.11 Additional Digging
- 08.01 Module Introduction (2:32)
- 08.02 What and Why is Defender Tech/Ops? (17:04)
- 08.03 Firewalls (17:05)
- 08.04 Endpoint Detection and Response EDR (20:46)
- 08.05 Mobile Device Management MDM (13:26)
- 08.06 Email Security Gateway (22:25)
- 08.07 Attack Emulation (21:03)
- 08.08 Security Incident and Event Management (SIEM) (20:55)
- 08.09 Lab - Configuring a Firewall (18:30)
- 08.10 Knowledge Assessment
- 08.11 Additional Digging
- 09.01 Module Introduction (2:08)
- 09.02 What is Espionage? (16:31)
- 09.03 Tools for Espionage (15:18)
- 09.04 Government and Corporate Espionage Case Studies (12:59)
- 09.05 Defending From Espionage (10:06)
- 09.06 Lab - Hiding Data in Pictures with Stegnography (22:13)
- 09.07 Knowledge Assessment
- 09.08 Additional Digging
- 12.01 Module Introduction (3:04)
- 12.02 What Is Vulnerability Management and Why Should You Care (21:59)
- 12.03 How Vulnerabilities are Discovered (17:28)
- 12.04 Bug Bounty Platforms and Responsible Disclosure (20:17)
- 12.05 Security Vulnerabilities and Patching (18:41)
- 12.06 Why Is Vulnerability Management Hard (12:06)
- 12.07 Lab - Vulnerability Scanning a System (17:33)
- 12.08 Knowledge Assessment
- 12.09 Additional Digging
- 13.01 Module Introduction (4:05)
- 13.02 What Is Cyber Warfare and Why Should You Care (10:51)
- 13.03 History of Cyber Warfare (22:53)
- 13.04 Advanced Persistent Threats (APT) (13:33)
- 13.05 Russian Ukrainian Conflict Cyber War Case Study (20:19)
- 13.06 Lab - Brute Forcing Access with Hydra (46:13)
- 13.07 Knowledge Assessment
- 13.08 Additional Digging
Who is Dr. Gerald Auger?
Dr. Auger is a 20+ year cybersecurity professional, academic, and published author. He is a leading cybersecurity expert at MUSC, an esteemed academic medical center with a multi-billion dollar scope.Â
He has established comprehensive cybersecurity programs, teaches in The Citadel Military College's Cyber Sciences department, and is the Chief Content Creator for the well-known YouTube channel Simply Cyber.Â
Passionate about his field, Dr. Auger has educated thousands of students and holds a PhD in Cyber Operations along with two Master's degrees in Computer Science and Information Assurance.
Connect with him at https://SimplyCyber.io/socials
Transparency Statement
This course is awesome and I poured a lot of thought, effort, and knowledge into it, but there are limitations I want to make sure you know before deciding if its right for you.
- Course access is 6 months from purchase. This course is designed to be completed in 3 months.
-
Lab environment is through TryHackMe and requires a $14/month TryHackMe subscription.
- Completing the course will issue you a certificate of completion and 22 CEU's.