Course Instructor
Hi! My name is Grant Collins, I am a current cybersecurity student and avid enthusiast. I will be the instructor of this course.
Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Section One Overview: The W's and H of Cybersecurity (1:34)
- What is Cybersecurity? (4:31)
- Misconceptions in Cybersecurity (2:22)
- Why Cybersecurity? (0:49)
- Where is Cybersecurity? (2:11)
- Who is Cybersecurity? (0:36)
- When and How is Cybersecurity Implemented? (0:43)
- Why Pursue a Career in Cybersecurity? (2:10)
Available in
days
days
after you enroll
- Section Two Overview (3:26)
- Security Architecture (1:53)
- Risk Assessment (1:03)
- Threat Intelligence (0:55)
- Governance, Risk, & Compliance (1:02)
- Security Operations (0:53)
- Physical Security (0:29)
- The Big Picture - Cybersecurity (2:11)
- More Details on the Big Picture (1:20)
- Conclusion of Cybersecurity Domains (2:32)
Available in
days
days
after you enroll
- Section Three Overview (1:41)
- Why Learn The IT Fundamentals? (4:51)
- Computing and Devices (1:06)
- Internal Computer Components (Hardware) (3:54)
- Hardware Components (Demo) (2:41)
- Input and Output (4:20)
- The Internet & Types (3:05)
- Storage Types (1:46)
- Computing & Hardware Recap (1:11)
- Create a Virtual Practice Environment (VirtualBox) (23:04)
- Overview of Operating Systems (5:26)
- Software & Application Types (Software) (3:50)
- Overview of Databases (2:40)
- Section Three Review (1:23)
Available in
days
days
after you enroll
- What's a Network? (1:07)
- Types of Networks (8:49)
- Overview of Servers (3:19)
- Network Devices (3:37)
- Network Topologies (1:57)
- End-to-End Communication (1:44)
- Overview of TCP-IP Model (2:10)
- Layer 1 - Link Layer (TCP/IP) (2:11)
- Layer 2 - Internet Layer (TCP/IP) (4:07)
- Layer 3 - Transport Layer (TCP/IP) (2:36)
- Layer 4 - Application (TCP/IP) (1:42)
- Overview of OSI Model (3:11)
- OSI File Transfer Example (2:46)
- Layer 1 - Physical (OSI) (2:09)
- Layer 2 - Data Link (OSI) (3:48)
- Layer 3 - Network (OSI) (8:15)
- Overview of Common Network Diagnostic Commands (6:45)
- Layer 4 - Transport (OSI) (2:47)
- Layer 5 - Session (OSI) (1:34)
- Layer 6 - Session (OSI) (1:49)
- Layer 7 - Application (OSI) (5:49)
- Port Assignment and Numbers (1:50)
- Wireshark (Demo) (4:03)
Available in
days
days
after you enroll
- Section Five Overview (1:10)
- Factors in Cybersecurity (3:17)
- Overview of Cybersecurity Attacks (1:32)
- Overview of Network Attacks (1:21)
- Network and Application Attacks (15:28)
- Download Kali Linux (Demo) (9:24)
- Wireless Attacks (6:49)
- Social and Physical Attacks (6:27)
- Cryptographic Attacks (6:20)
- Types of Malware (8:19)
- Types of Threat Actors (10:04)
- Consequences to Cybersecurity (1:55)
- Vulnerabilities (6:53)
- General Defenses (11:20)
- Cyber Defenses - Firewalls (4:20)
- Cyber Defenses - VPN & Proxies (4:33)
- Cyber Defenses - IDS and IPS (2:48)
- Router, Switch, and Access Point Security (4:38)
- SIEM and Load Balancers (3:10)
- Data Loss Prevention, Email Gateway, Network Access Control (3:53)
- Software Tools (10:35)
- Network Topologies (5:19)
- Cryptography Overview (4:32)
- Symmetric v Asymmetric (6:36)
- Digial Signatures, Hashes, and Salting (2:43)
- Cryptographic Algorithms (7:43)
- Public Key Infastructure (12:08)
- Security Approaches (5:14)
- Introduction to Cybersecurity Domains (2:13)
- Security Architecture (Domain) (7:32)
- Risk Assessment (Domain) (5:01)
- Threat Intelligence (Domain) (2:09)
- Governance, Risk, and Compliance (Domain) (7:46)
- Security Operations (Domain) (4:40)
- Physical Security (Domain) (2:37)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Introduction to Linux (9:53)
- Installing Linux Virtual Machine into VirtualBox (Demo) (15:48)
- Navigating to Terminal, Navigation Commands, and Help (15:02)
- Working with Directories (10:11)
- File and Directory Permissions (11:43)
- Find and Working with Files (28:53)
- Input and Output Redirection (18:43)
- Patterns, Process Control, and Variables (9:53)
- Users and Software (6:44)
Available in
days
days
after you enroll
- Project Introduction (1:46)
- IPTables Introduction (3:07)
- Cloning VM for Project (1:52)
- IPTables Overview (5:09)
- Creating IPTables Rules (9:23)
- Firewall Rules - Saving IPTable Rules (5:54)
- Introduction to LAMP Stack (1:14)
- Overview of LAMP Stack (6:32)
- Creating Bash Script to Install LAMP (6:40)
- Developing LAMP Stack Installation Script (20:45)
Available in
days
days
after you enroll
- Section Seven Overview (1:31)
- Common Use Cases for Programming (2:17)
- Programming Languages (Overview) (5:43)
- Fundamentals of Programming and Syntax (2:57)
- Python Background and Exercise Overview (3:04)
- Setting up Python Environment in Windows Environment (Demo) (4:48)
- Setting up Python Environment in Linux (Demo) (0:40)
- IP Address Class Checker Overview and Script Development (4:10)
- Comments and Printing (11:10)
- Data Types (11:27)
- Variables (8:26)
- Input Type Conversion (12:54)
- Operators - Airthmetic, Relational, and Logtical (13:20)
- Conditional Statements (9:43)
- Arrays (29:55)
- Adding Conditional Statements to IP Addresses Checker (14:34)
- Loops (10:11)
- Functions (9:35)
- Libraries (9:14)
- Finishing IP Address Checker Program (14:00)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll