About this Course
This course gives learners with a baseline understanding of frequent cyber safety threats, vulnerabilities, and dangers. An summary of how fundamental cyber assaults are constructed and utilized to actual programs can also be included. Examples embrace easy Unix kernel hacks, Web worms, and Trojan horses in software program utilities. Community assaults resembling distributed denial of service (DDOS) and botnet- assaults are additionally described and illustrated utilizing actual examples from the previous couple of many years.
SKILLS YOU WILL GAIN
- Cybersecurity
- Data Safety (INFOSEC)
- Denial-Of-Service Assault (DOS)
- Threat Evaluation
Syllabus – What you’ll study from this course
5 hours to finish
Introduction to Cyber Safety
This module gives publicity to fundamental cyber safety ideas together with some easy, foundational assault strategies.
6 hours to finish
Understanding Primary Safety Frameworks
This module introduces some elementary frameworks, fashions, and approaches to cyber safety together with the CIA mannequin.
4 hours to finish
Inspecting Cyber Threats Extra Carefully
This module covers a few of the extra intense assaults over the previous decade together with worms and DDOS assaults.
4 hours to finish
Introducing Safety Threat Evaluation
This module introduces fundamental engineering and evaluation strategies for managing cyber safety danger to valued belongings.
0 Comments