Free online courseCyber security

Duration of the online course: 2 hours and 7 minutes

4.79

StarStarStarStarStar

(346)

Master cyber security with Packethacks' comprehensive free online course. Covering everything from basic concepts to advanced labs, enhance your internet security skills today.

Course Description

Discover the intricacies of online protection with the **Cyber Security** course, a comprehensive program spanning **2 hours and 7 minutes**. Garnering an impressive **average rating of 4.8 out of 5 stars**, this course is an essential addition to the professional toolkit of anyone interested in **Information Technology**, specifically under the **Information Security** umbrella.

Embark on your cybersecurity journey with the **Introduction** module, where you'll grasp the fundamentals of internet security. This initial class serves as a solid foundation, setting the stage for more advanced concepts.

The **Basic Concepts** module delves deeper into crucial internet security principles, presented through engaging GeekyVid tutorials. These videos demystify complex topics, making them accessible and easy to understand.

In the **Security Policy** class, you will learn how to formulate and implement effective security policies. This segment emphasizes the importance of defined protocols and guidelines to safeguard digital assets.

Next, the **Educate End Users** class empowers you with strategies to educate users about potential security threats. Recognizing that people often represent the weakest link in security, this section underscores the critical role of ongoing education and awareness.

Transition to **Physical Security**, where you examine practical measures to protect physical IT infrastructure. This module includes a hands-on lab using inSSIDer to illustrate real-world applications of these concepts.

The course then covers **Perimeter Security**, focusing on defenses to protect the outer boundaries of your network. This segment includes a lab component to reinforce theoretical knowledge with practical skills.

**Password Management** highlights the significance of strong, secure passwords. You’ll learn best practices for creating, storing, and managing passwords to mitigate unauthorized access risks.

Subsequently, the **Eliminate Unnecessary Services** class sheds light on identifying and disabling non-essential services that could be potential security vulnerabilities. Labs using Netstat and Nmap provide practical experience with these tools.

Engage in **Patch Management** to ensure systems are up-to-date with the latest security patches. The hands-on lab with Landesk offers a practical understanding of patch deployment.

**AntiVirus** protection is covered extensively, including labs with SonicWALL and EPO to demonstrate installation and configuration techniques.

The course also tackles **Access Control**, instructing on methods to restrict unauthorized access to sensitive data. Techniques for managing Data in Transit are illustrated through a VPN lab, offering critical insights into securing data as it moves across networks.

Explore **Intrusion Prevention Systems (IPS)** with practical labs that detail the setup and use of IPS tools like SonicWALL, designed to preemptively block security threats.

Finally, delve into **Backup** strategies, ensuring data integrity and availability in case of system failures. A lab session using Backupexec completes this in-depth exploration of backup solutions.

This curriculum not only equips you with essential cybersecurity knowledge but also provides ample hands-on practice to apply what you've learned. By the end of the course, you'll be well-versed in multiple aspects of cybersecurity, making you a proficient guardian of digital realms.

Conteúdo do Curso

  • Video class: Cyber Security Class: 1 Introduction. Learn Internet Security. CyberSecurity 101

    0h02m

  • Video class: Cyber Security Class: 2 Basic Concepts. Learn Internet Security. Another GeekyVid

    0h07m

  • Exercise: There are many basic concepts about network security, which are also the starting line of this course. Regarding information security, what does the CIA triad stands for?

  • Video class: Cyber Security Class: 3 Security Policy. Learn Internet Security. Another GeekyVid

    0h05m

  • Exercise: As you move forward in learning about information security and its world, you’ll find yourself meeting Security Policies, that helps to maintain the critical balance of security. Which one of the options below does not belong to the Security Policy along the lines on the video?

  • Video class: Cyber Security Class: 4 Educate End Users. Learn Internet Security. Another GeekyVid

    0h02m

  • Exercise: _What is more likely to compromise a confidential file in a company?

  • Video class: Cyber Security Class: 5 Physical Security. Learn Internet Security. Another GeekyVid

    0h05m

  • Exercise: Regarding the subject of implementing physical security, it makes the following question “Is it more likely that a confidential file will be compromised by a blackhat by defeating your firewall, or by a visitor walking up to a PC and copying the file onto a thumbdrive?” Which option makes more sense?

  • Video class: Cyber Security Class: 6 Physical Security Lab - inSSIDer. Learn Internet Security. Another GeekyVid

    0h07m

  • Exercise: _What is a rogue access point?

  • Video class: Cyber Security Class: 7 Perimeter Security. Learn Internet Security. Another GeekyVid

    0h10m

  • Exercise: Concerning the firewall configuration, it has a few starting steps. About the Second-generation firewall functionality, what layers does it occurs in the OSI reference model?

  • Video class: Cyber Security Class: 8 Perimeter Security Lab. Learn Internet Security. Another GeekyVid

    0h09m

  • Exercise: _What is the advantage of using Dell SonicWALL firewalls for this demonstration?

  • Video class: Cyber Security Class: 9 Password Management. Learn Internet Security. Another GeekyVid

    0h05m

  • Exercise: When developing a password, you must make sure it has a good management, since it is one of the key starting points of your security. Having that in mind, which one of the alternatives are false?

  • Video class: Cyber Security Class: 10 Eliminate Unnecessary Services. Learn Internet Security. Another GeekyVid

    0h04m

  • Exercise: _What is the purpose of a server listening on a specific service?

  • Video class: Cyber Security Course: 11 Eliminate Unnecessary Services Lab - Netstat. Learn Internet Security

    0h04m

  • Exercise: _What is the command to check for open ports on a Windows server?

  • Video class: Cyber Security Course: 12 Eliminate Unnecessary Services Lab - Nmap. Learn Internet Security

    0h05m

  • Exercise: While setting up your own server, one of the thing you may want to avoid is doing extra work. A scanning tool is shown “Nmap”, whats it main function that interest in that purpose the most?

  • Video class: Cyber Security Class: 13 Patch Management. Learn Internet Security

    0h03m

  • Exercise: Regarding good patch management procedure, that helps preventing attacks from blackhats on any flaw or exploitable that exists in your system. Mark the alternative that is untrue to the procedure itself.

  • Video class: Cyber Security Course: 14 Patch Management Lab - Landesk. Learn Internet Security

    0h03m

  • Exercise: _What is the key benefit of LANDesk patch management?

  • Video class: Cyber Security Course: 15 AntiVirus. Learn Internet Security

    0h04m

  • Exercise: Implementing antivirus measures is a must, every workstation should have it to protect itself from a long list of possible virtual threats. Given that, why laptops can be challenging?

  • Video class: Cyber Security Course: 16 AntiVirus Lab - SonicWALL. Learn Internet Security

    0h05m

  • Exercise: _What are the two types of antivirus available on SonicWALL network security appliance or firewall?

  • Video class: Cyber Security Course: 17 AntiVirus Lab - EPO. Learn Internet Security

    0h04m

  • Exercise: _What is the main purpose of McAfee Policy Orchestrator (EPO)?

  • Video class: Cyber Security Course: 18 Access Control. Learn Internet Security

    0h04m

  • Exercise: _What is the principle of least privilege?

  • Video class: Cyber Security Course: 19 Data in Transit. Learn Internet Security

    0h06m

  • Exercise: As you start securing data in transit, to avoid the activities of black hats, its a must to encrypt it, since it will allow us to achieve diferente goals, that are:

  • Video class: Cyber Security Course: 20 Data in Transit Lab - VPN. Learn Internet Security

    0h06m

This free course includes:

2 hours and 7 minutes of online video course

Exercises to train your knowledge

Certificate of course completion

100% free, from content to certificate

QR Code - Baixar Cursa - Cursos Online

This online course can only be accessed through the Cursa App. Download it using the QR code or the links below:

This online course can only be accessed through the Cursa app. Install it using the links below:

  • Study for free!

    Here you never pay! Not even for the certificate, because everything in the app is 100% free!

  • Improve your resume!

    There are more than 4,000 free courses for you to study anything that interests you!

  • Free Digital Certificate!

    Complete the course and issue your internationally recognized Digital Certificate free of charge.

Course comments: Cyber security

KS

Khadir Sharp

????????????????

TM

Tinyiko malungana

getting more important information ????

NM

Ndaba Monyane

good

HD

Hlangabeza Dlamini

wow this is good

AD

Ali Dhuux

nice course thnks

SS

Shubham Swaraj

very nice course

EK

Emmanuel kehinde

love this, Thank you

SK

Siva Kumar S

nice

RD

Rohit Daulat Bhosale

Superb

LM

lilian mati

nice

More free courses at Cyber Security

Download the App now to have access to + 3300 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online video courses, audio or text courses.

  • More than 48 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate

+ 6.5 million
students

Free and Valid
Certificate with QR Code

48 thousand free
exercises

4.8/5 rating in
app stores

Free courses in
video, audio and text