Free Course Image Cyber security

Free online courseCyber security

Duration of the online course: 2 hours and 7 minutes

4.78

StarStarStarStarStar

(365)

Master cyber security with Packethacks' comprehensive free online course. Covering everything from basic concepts to advanced labs, enhance your internet security skills today.

In this free course, learn about

  • Introduction and Core Security Concepts
  • Human and Physical Security
  • Perimeter Security and Firewalls
  • System Hardening and Patch Management
  • Malware Protection and Access Control
  • Secure Data Transit, Network Protection, and Backup

Course Description

Discover the intricacies of online protection with the **Cyber Security** course, a comprehensive program spanning **2 hours and 7 minutes**. Garnering an impressive **average rating of 4.8 out of 5 stars**, this course is an essential addition to the professional toolkit of anyone interested in **Information Technology**, specifically under the **Information Security** umbrella.

Embark on your cybersecurity journey with the **Introduction** module, where you'll grasp the fundamentals of internet security. This initial class serves as a solid foundation, setting the stage for more advanced concepts.

The **Basic Concepts** module delves deeper into crucial internet security principles, presented through engaging GeekyVid tutorials. These videos demystify complex topics, making them accessible and easy to understand.

In the **Security Policy** class, you will learn how to formulate and implement effective security policies. This segment emphasizes the importance of defined protocols and guidelines to safeguard digital assets.

Next, the **Educate End Users** class empowers you with strategies to educate users about potential security threats. Recognizing that people often represent the weakest link in security, this section underscores the critical role of ongoing education and awareness.

Transition to **Physical Security**, where you examine practical measures to protect physical IT infrastructure. This module includes a hands-on lab using inSSIDer to illustrate real-world applications of these concepts.

The course then covers **Perimeter Security**, focusing on defenses to protect the outer boundaries of your network. This segment includes a lab component to reinforce theoretical knowledge with practical skills.

**Password Management** highlights the significance of strong, secure passwords. You’ll learn best practices for creating, storing, and managing passwords to mitigate unauthorized access risks.

Subsequently, the **Eliminate Unnecessary Services** class sheds light on identifying and disabling non-essential services that could be potential security vulnerabilities. Labs using Netstat and Nmap provide practical experience with these tools.

Engage in **Patch Management** to ensure systems are up-to-date with the latest security patches. The hands-on lab with Landesk offers a practical understanding of patch deployment.

**AntiVirus** protection is covered extensively, including labs with SonicWALL and EPO to demonstrate installation and configuration techniques.

The course also tackles **Access Control**, instructing on methods to restrict unauthorized access to sensitive data. Techniques for managing Data in Transit are illustrated through a VPN lab, offering critical insights into securing data as it moves across networks.

Explore **Intrusion Prevention Systems (IPS)** with practical labs that detail the setup and use of IPS tools like SonicWALL, designed to preemptively block security threats.

Finally, delve into **Backup** strategies, ensuring data integrity and availability in case of system failures. A lab session using Backupexec completes this in-depth exploration of backup solutions.

This curriculum not only equips you with essential cybersecurity knowledge but also provides ample hands-on practice to apply what you've learned. By the end of the course, you'll be well-versed in multiple aspects of cybersecurity, making you a proficient guardian of digital realms.

Course content

  • Video class: Cyber Security Class: 1 Introduction. Learn Internet Security. CyberSecurity 101 02m
  • Exercise: Who is this network security course designed for?
  • Video class: Cyber Security Class: 2 Basic Concepts. Learn Internet Security. Another GeekyVid 07m
  • Exercise: There are many basic concepts about network security, which are also the starting line of this course. Regarding information security, what does the CIA triad stands for?
  • Video class: Cyber Security Class: 3 Security Policy. Learn Internet Security. Another GeekyVid 05m
  • Exercise: As you move forward in learning about information security and its world, you’ll find yourself meeting Security Policies, that helps to maintain the critical balance of security. Which one of the options below does not belong to the Security Policy along the lines on the video?
  • Video class: Cyber Security Class: 4 Educate End Users. Learn Internet Security. Another GeekyVid 02m
  • Exercise: _What is more likely to compromise a confidential file in a company?
  • Video class: Cyber Security Class: 5 Physical Security. Learn Internet Security. Another GeekyVid 05m
  • Exercise: Regarding the subject of implementing physical security, it makes the following question “Is it more likely that a confidential file will be compromised by a blackhat by defeating your firewall, or by a visitor walking up to a PC and copying the file onto a thumbdrive?” Which option makes more sense?
  • Video class: Cyber Security Class: 6 Physical Security Lab - inSSIDer. Learn Internet Security. Another GeekyVid 07m
  • Exercise: _What is a rogue access point?
  • Video class: Cyber Security Class: 7 Perimeter Security. Learn Internet Security. Another GeekyVid 10m
  • Exercise: Concerning the firewall configuration, it has a few starting steps. About the Second-generation firewall functionality, what layers does it occurs in the OSI reference model?
  • Video class: Cyber Security Class: 8 Perimeter Security Lab. Learn Internet Security. Another GeekyVid 09m
  • Exercise: _What is the advantage of using Dell SonicWALL firewalls for this demonstration?
  • Video class: Cyber Security Class: 9 Password Management. Learn Internet Security. Another GeekyVid 05m
  • Exercise: When developing a password, you must make sure it has a good management, since it is one of the key starting points of your security. Having that in mind, which one of the alternatives are false?
  • Video class: Cyber Security Class: 10 Eliminate Unnecessary Services. Learn Internet Security. Another GeekyVid 04m
  • Exercise: _What is the purpose of a server listening on a specific service?
  • Video class: Cyber Security Course: 11 Eliminate Unnecessary Services Lab - Netstat. Learn Internet Security 04m
  • Exercise: _What is the command to check for open ports on a Windows server?
  • Video class: Cyber Security Course: 12 Eliminate Unnecessary Services Lab - Nmap. Learn Internet Security 05m
  • Exercise: While setting up your own server, one of the thing you may want to avoid is doing extra work. A scanning tool is shown “Nmap”, whats it main function that interest in that purpose the most?
  • Video class: Cyber Security Class: 13 Patch Management. Learn Internet Security 03m
  • Exercise: Regarding good patch management procedure, that helps preventing attacks from blackhats on any flaw or exploitable that exists in your system. Mark the alternative that is untrue to the procedure itself.
  • Video class: Cyber Security Course: 14 Patch Management Lab - Landesk. Learn Internet Security 03m
  • Exercise: _What is the key benefit of LANDesk patch management?
  • Video class: Cyber Security Course: 15 AntiVirus. Learn Internet Security 04m
  • Exercise: Implementing antivirus measures is a must, every workstation should have it to protect itself from a long list of possible virtual threats. Given that, why laptops can be challenging?
  • Video class: Cyber Security Course: 16 AntiVirus Lab - SonicWALL. Learn Internet Security 05m
  • Exercise: _What are the two types of antivirus available on SonicWALL network security appliance or firewall?
  • Video class: Cyber Security Course: 17 AntiVirus Lab - EPO. Learn Internet Security 04m
  • Exercise: _What is the main purpose of McAfee Policy Orchestrator (EPO)?
  • Video class: Cyber Security Course: 18 Access Control. Learn Internet Security 04m
  • Exercise: _What is the principle of least privilege?
  • Video class: Cyber Security Course: 19 Data in Transit. Learn Internet Security 06m
  • Exercise: As you start securing data in transit, to avoid the activities of black hats, its a must to encrypt it, since it will allow us to achieve diferente goals, that are:
  • Video class: Cyber Security Course: 20 Data in Transit Lab - VPN. Learn Internet Security 06m
  • Exercise: What is a recommended encryption method for a stronger VPN setup?
  • Video class: Cyber Security Course: 21 IPS. Learn Internet Security 04m
  • Exercise: _What is the difference between IDS and IPS?
  • Video class: Cyber Security Course: 22 IPS Lab - SonicWALL. Learn Internet Security 03m
  • Exercise: _What is the purpose of intrusion prevention on a SonicWALL appliance?
  • Video class: Cyber Security Course: 23 Backup. Learn Internet Security 03m
  • Exercise: ‘Back up’ is a must action you gotta do related to all this work, and it comes in many ways to help you or not, depending on your work style. There’s a particular quote to emphasyze it, which one of the alternative was shown on the vídeo?
  • Video class: Cyber Security Course: 24 Backup Lab - Backupexec. Learn Internet Security 04m
  • Exercise: _What are the different media options available for backup using Symantec Backup Exec?

This free course includes:

2 hours and 7 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

Course comments: Cyber security

Students found the free online course amazing and very good, praising its excellent study material and valuable information. Many described it as nice, superb, and very helpful, expressing gratitude and enthusiasm for learning cybersecurity.

Murali Mohan S

Excellent study material

Shubham Swaraj

very nice course

Ali Dhuux

nice course thnks

Hlangabeza Dlamini

wow this is good

Rohit Daulat Bhosale

Superb

Emmanuel kehinde

love this, Thank you

Fred M.K

amazing ????

Tinyiko malungana

getting more important information ????

Ndaba Monyane

good

Siva Kumar S

nice

More free courses at Cyber Security

Download the App now to have access to + 3300 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 48 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate

+ 9 million
students

Free and Valid
Certificate

60 thousand free
exercises

4.8/5 rating in
app stores

Free courses in
video and ebooks