Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Introduction to Cybersecurity: A Practical Approach to Getting Started
Section 0: Overview of Course
Course Introduction and Welcome! (2:20)
About Me - Course Instructor (0:54)
Course Goals and Objectives (2:50)
Course Overview (6:12)
Training Platforms List
Tools and Technologies List
Complete Cybersecurity Projects List
(Links) Acronym / Terminology Flashcards & Course GitHub Repository
Section 1: Overview of Cybersecurity
Section One Overview: The W's and H of Cybersecurity (1:34)
What is Cybersecurity? (4:31)
Misconceptions in Cybersecurity (2:22)
Why Cybersecurity? (0:49)
Where is Cybersecurity? (2:11)
Who is Cybersecurity? (0:36)
When and How is Cybersecurity Implemented? (0:43)
Why Pursue a Career in Cybersecurity? (2:10)
Section 2: Domains of Cybersecurity - Brief Overview
Section Two Overview (3:26)
Security Architecture (1:53)
Risk Assessment (1:03)
Threat Intelligence (0:55)
Governance, Risk, & Compliance (1:02)
Security Operations (0:53)
Physical Security (0:29)
The Big Picture - Cybersecurity (2:11)
More Details on the Big Picture (1:20)
Conclusion of Cybersecurity Domains (2:32)
Section 3: I.T. Fundamentals
Section Three Overview (1:41)
Why Learn The IT Fundamentals? (4:51)
Computing and Devices (1:06)
Internal Computer Components (Hardware) (3:54)
Hardware Components (Demo) (2:41)
Input and Output (4:20)
The Internet & Types (3:05)
Storage Types (1:46)
Computing & Hardware Recap (1:11)
Create a Virtual Practice Environment (VirtualBox) (23:04)
Overview of Operating Systems (5:26)
Software & Application Types (Software) (3:50)
Overview of Databases (2:40)
Section Three Review (1:23)
Section 4: Networks & Networking
What's a Network? (1:07)
Types of Networks (8:49)
Overview of Servers (3:19)
Network Devices (3:37)
Network Topologies (1:57)
End-to-End Communication (1:44)
Overview of TCP-IP Model (2:10)
Layer 1 - Link Layer (TCP/IP) (2:11)
Layer 2 - Internet Layer (TCP/IP) (4:07)
Layer 3 - Transport Layer (TCP/IP) (2:36)
Layer 4 - Application (TCP/IP) (1:42)
Overview of OSI Model (3:11)
OSI File Transfer Example (2:46)
Layer 1 - Physical (OSI) (2:09)
Layer 2 - Data Link (OSI) (3:48)
Layer 3 - Network (OSI) (8:15)
Overview of Common Network Diagnostic Commands (6:45)
Layer 4 - Transport (OSI) (2:47)
Layer 5 - Session (OSI) (1:34)
Layer 6 - Session (OSI) (1:49)
Layer 7 - Application (OSI) (5:49)
Port Assignment and Numbers (1:50)
Wireshark (Demo) (4:03)
Section 5: I.T. Security Fundamentals
Section Five Overview (1:10)
Factors in Cybersecurity (3:17)
Overview of Cybersecurity Attacks (1:32)
Overview of Network Attacks (1:21)
Network and Application Attacks (15:28)
Download Kali Linux (Demo) (9:24)
Wireless Attacks (6:49)
Social and Physical Attacks (6:27)
Cryptographic Attacks (6:20)
Types of Malware (8:19)
Types of Threat Actors (10:04)
Consequences to Cybersecurity (1:55)
Vulnerabilities (6:53)
General Defenses (11:20)
Cyber Defenses - Firewalls (4:20)
Cyber Defenses - VPN & Proxies (4:33)
Cyber Defenses - IDS and IPS (2:48)
Router, Switch, and Access Point Security (4:38)
SIEM and Load Balancers (3:10)
Data Loss Prevention, Email Gateway, Network Access Control (3:53)
Software Tools (10:35)
Network Topologies (5:19)
Cryptography Overview (4:32)
Symmetric v Asymmetric (6:36)
Digial Signatures, Hashes, and Salting (2:43)
Cryptographic Algorithms (7:43)
Public Key Infastructure (12:08)
Security Approaches (5:14)
Introduction to Cybersecurity Domains (2:13)
Security Architecture (Domain) (7:32)
Risk Assessment (Domain) (5:01)
Threat Intelligence (Domain) (2:09)
Governance, Risk, and Compliance (Domain) (7:46)
Security Operations (Domain) (4:40)
Physical Security (Domain) (2:37)
Section 3 - 5 Project: Building an Active Directory Homelab
Project Introdcution (1:00)
Introduction to Windows Server and AD (2:55)
Overview of Active Directory (4:02)
Steps of Project (2:57)
Creating Active Directory Homelab (Demo) (40:43)
Section 6: Introduction to Linux
Introduction to Linux (9:53)
Installing Linux Virtual Machine into VirtualBox (Demo) (15:48)
Navigating to Terminal, Navigation Commands, and Help (15:02)
Working with Directories (10:11)
File and Directory Permissions (11:43)
Find and Working with Files (28:53)
Input and Output Redirection (18:43)
Patterns, Process Control, and Variables (9:53)
Users and Software (6:44)
Section 6 Project: IPTables and LAMP Stack
Project Introduction (1:46)
IPTables Introduction (3:07)
Cloning VM for Project (1:52)
IPTables Overview (5:09)
Creating IPTables Rules (9:23)
Firewall Rules - Saving IPTable Rules (5:54)
Introduction to LAMP Stack (1:14)
Overview of LAMP Stack (6:32)
Creating Bash Script to Install LAMP (6:40)
Developing LAMP Stack Installation Script (20:45)
Section 7: Introduction to Programming
Section Seven Overview (1:31)
Common Use Cases for Programming (2:17)
Programming Languages (Overview) (5:43)
Fundamentals of Programming and Syntax (2:57)
Python Background and Exercise Overview (3:04)
Setting up Python Environment in Windows Environment (Demo) (4:48)
Setting up Python Environment in Linux (Demo) (0:40)
IP Address Class Checker Overview and Script Development (4:10)
Comments and Printing (11:10)
Data Types (11:27)
Variables (8:26)
Input Type Conversion (12:54)
Operators - Airthmetic, Relational, and Logtical (13:20)
Conditional Statements (9:43)
Arrays (29:55)
Adding Conditional Statements to IP Addresses Checker (14:34)
Loops (10:11)
Functions (9:35)
Libraries (9:14)
Finishing IP Address Checker Program (14:00)
Section 7 Project: Script Development - (MAC Address / Network Scanner)
Introduction to Section 7 Projects (3:00)
MAC Address Changer Script (26:32)
Network Scanner Script (65:07)
Section 8: Skills of a Successful Cybersecurity Student
Section Eight Overview (0:55)
Skills of Successful Cybersecurity Professionals (5:08)
Skills of Successful Cybersecurity Students (7:33)
Section 9: Launching into Your Learning Journey!
Section Nine Overview (2:46)
Develop a Learning Path / Plan (3:08)
Overview of Project Idea Example (10:06)
Course Conclusion - A Sincere Thank You! (1:32)
Teach online with
Create a Virtual Practice Environment (VirtualBox)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock