Free Course Image Cyber security

Free online courseCyber security

Duration of the online course: 2 hours and 7 minutes

4.78

StarStarStarStarStar

(368)

Build real-world cybersecurity skills with a free online course covering policies, firewalls, password hygiene, patching, VPNs and more—perfect for career growth.

In this free course, learn about

  • Cybersecurity fundamentals and who a network security course is designed for
  • Core security concepts: CIA triad (Confidentiality, Integrity, Availability)
  • Security policies: purpose, types, and what does/doesn’t belong in a policy set
  • End-user security risks and common ways confidential data gets compromised
  • Physical security threats vs purely technical attacks; prioritizing real-world risks
  • Wireless basics: detecting issues with inSSIDer and understanding rogue access points
  • Perimeter security concepts and firewall generations; OSI layers for 2nd-gen firewalls
  • Firewall lab exposure with Dell SonicWALL and why it's useful for demonstrations
  • Password management best practices and identifying common false assumptions
  • Reducing attack surface by removing unnecessary services; why servers listen on ports
  • Host/network discovery: using netstat on Windows and Nmap’s main security function
  • Patch management procedures and benefits of centralized tools like LANDesk
  • Antivirus deployment challenges (especially laptops) and SonicWALL AV types
  • Centralized security management with McAfee ePO and least-privilege access control
  • Securing data in transit with encryption; VPN lab and stronger encryption methods

Course Description

Strengthen your ability to protect systems, networks, and data with a practical introduction to cybersecurity fundamentals. This free online course is designed to help you think like a defender: identify common weaknesses, understand how attackers take advantage of them, and apply straightforward controls that reduce risk in real environments. Whether you are exploring a future in security or you support technology in any role, you will leave with clearer judgment about what matters most and how to prioritize protections.

You will build a solid foundation of core concepts and security mindset, including how confidentiality, integrity, and availability guide daily decisions. From there, you will connect those ideas to policies and procedures that organizations rely on to keep security consistent and measurable. You will also see why human behavior and awareness are often just as important as technical tools, and how small mistakes can lead to major exposure.

As you progress, the course focuses on hands-on, job-relevant scenarios: improving physical and wireless security, understanding rogue access points, and applying perimeter defenses with firewalls. You will practice strengthening authentication through better password management and learn how reducing unnecessary services can shrink your attack surface. You will also explore essential operations tasks like patch management and endpoint protection, with an emphasis on why these controls fail in practice and how to implement them more effectively.

Finally, you will learn how to protect information while it moves across networks by using encryption and VPN concepts, helping you choose stronger approaches for safer communication. Throughout the course, short quizzes and labs reinforce decision-making, making it easier to transfer what you learn into workplace routines, personal projects, or the next step in your cybersecurity learning path.

Course content

  • Video class: Cyber Security Class: 1 Introduction. Learn Internet Security. CyberSecurity 101

    02m

  • Exercise: Who is this network security course designed for?

  • Video class: Cyber Security Class: 2 Basic Concepts. Learn Internet Security. Another GeekyVid

    07m

  • Exercise: There are many basic concepts about network security, which are also the starting line of this course. Regarding information security, what does the CIA triad stands for?

  • Video class: Cyber Security Class: 3 Security Policy. Learn Internet Security. Another GeekyVid

    05m

  • Exercise: As you move forward in learning about information security and its world, you’ll find yourself meeting Security Policies, that helps to maintain the critical balance of security. Which one of the options below does not belong to the Security Policy along the lines on the video?

  • Video class: Cyber Security Class: 4 Educate End Users. Learn Internet Security. Another GeekyVid

    02m

  • Exercise: _What is more likely to compromise a confidential file in a company?

  • Video class: Cyber Security Class: 5 Physical Security. Learn Internet Security. Another GeekyVid

    05m

  • Exercise: Regarding the subject of implementing physical security, it makes the following question “Is it more likely that a confidential file will be compromised by a blackhat by defeating your firewall, or by a visitor walking up to a PC and copying the file onto a thumbdrive?” Which option makes more sense?

  • Video class: Cyber Security Class: 6 Physical Security Lab - inSSIDer. Learn Internet Security. Another GeekyVid

    07m

  • Exercise: _What is a rogue access point?

  • Video class: Cyber Security Class: 7 Perimeter Security. Learn Internet Security. Another GeekyVid

    10m

  • Exercise: Concerning the firewall configuration, it has a few starting steps. About the Second-generation firewall functionality, what layers does it occurs in the OSI reference model?

  • Video class: Cyber Security Class: 8 Perimeter Security Lab. Learn Internet Security. Another GeekyVid

    09m

  • Exercise: _What is the advantage of using Dell SonicWALL firewalls for this demonstration?

  • Video class: Cyber Security Class: 9 Password Management. Learn Internet Security. Another GeekyVid

    05m

  • Exercise: When developing a password, you must make sure it has a good management, since it is one of the key starting points of your security. Having that in mind, which one of the alternatives are false?

  • Video class: Cyber Security Class: 10 Eliminate Unnecessary Services. Learn Internet Security. Another GeekyVid

    04m

  • Exercise: _What is the purpose of a server listening on a specific service?

  • Video class: Cyber Security Course: 11 Eliminate Unnecessary Services Lab - Netstat. Learn Internet Security

    04m

  • Exercise: _What is the command to check for open ports on a Windows server?

  • Video class: Cyber Security Course: 12 Eliminate Unnecessary Services Lab - Nmap. Learn Internet Security

    05m

  • Exercise: While setting up your own server, one of the thing you may want to avoid is doing extra work. A scanning tool is shown “Nmap”, whats it main function that interest in that purpose the most?

  • Video class: Cyber Security Class: 13 Patch Management. Learn Internet Security

    03m

  • Exercise: Regarding good patch management procedure, that helps preventing attacks from blackhats on any flaw or exploitable that exists in your system. Mark the alternative that is untrue to the procedure itself.

  • Video class: Cyber Security Course: 14 Patch Management Lab - Landesk. Learn Internet Security

    03m

  • Exercise: _What is the key benefit of LANDesk patch management?

  • Video class: Cyber Security Course: 15 AntiVirus. Learn Internet Security

    04m

  • Exercise: Implementing antivirus measures is a must, every workstation should have it to protect itself from a long list of possible virtual threats. Given that, why laptops can be challenging?

  • Video class: Cyber Security Course: 16 AntiVirus Lab - SonicWALL. Learn Internet Security

    05m

  • Exercise: _What are the two types of antivirus available on SonicWALL network security appliance or firewall?

  • Video class: Cyber Security Course: 17 AntiVirus Lab - EPO. Learn Internet Security

    04m

  • Exercise: _What is the main purpose of McAfee Policy Orchestrator (EPO)?

  • Video class: Cyber Security Course: 18 Access Control. Learn Internet Security

    04m

  • Exercise: _What is the principle of least privilege?

  • Video class: Cyber Security Course: 19 Data in Transit. Learn Internet Security

    06m

  • Exercise: As you start securing data in transit, to avoid the activities of black hats, its a must to encrypt it, since it will allow us to achieve diferente goals, that are:

  • Video class: Cyber Security Course: 20 Data in Transit Lab - VPN. Learn Internet Security

    06m

  • Exercise: What is a recommended encryption method for a stronger VPN setup?

This free course includes:

2 hours and 7 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

Course comments: Cyber security

Students found the free course excellent and informative, with strong study materials. Many enjoyed it and said it’s amazing/superb, helpful for learning cybersecurity and motivating them to keep improving.

MM

Murali Mohan S

StarStarStarStarStar

Excellent study material

RD

Rohit Daulat Bhosale

StarStarStarStarStar

Superb

EK

Emmanuel kehinde

StarStarStarStarStar

love this, Thank you

SS

Shubham Swaraj

StarStarStarStarStar

very nice course

AD

Ali Dhuux

StarStarStarStar

nice course thnks

HD

Hlangabeza Dlamini

StarStarStarStarStar

wow this is good

TM

Tinyiko malungana

StarStarStarStarStar

getting more important information

FM

Fred M.K

StarStarStarStarStar

amazing

K

kgosi

StarStarStarStarStar

I gave myself a task tht at the end of the year I will know 50% of this cyber security thing because I’m coming from a divorce of 9 years marriage……….

NO

Nodira Obidova

StarStarStarStarStar

like it

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate