Master cyber security with Packethacks' comprehensive free online course. Covering everything from basic concepts to advanced labs, enhance your internet security skills today.
Discover the intricacies of online protection with the **Cyber Security** course, a comprehensive program spanning **2 hours and 7 minutes**. Garnering an impressive **average rating of 4.8 out of 5 stars**, this course is an essential addition to the professional toolkit of anyone interested in **Information Technology**, specifically under the **Information Security** umbrella.
Embark on your cybersecurity journey with the **Introduction** module, where you'll grasp the fundamentals of internet security. This initial class serves as a solid foundation, setting the stage for more advanced concepts.
The **Basic Concepts** module delves deeper into crucial internet security principles, presented through engaging GeekyVid tutorials. These videos demystify complex topics, making them accessible and easy to understand.
In the **Security Policy** class, you will learn how to formulate and implement effective security policies. This segment emphasizes the importance of defined protocols and guidelines to safeguard digital assets.
Next, the **Educate End Users** class empowers you with strategies to educate users about potential security threats. Recognizing that people often represent the weakest link in security, this section underscores the critical role of ongoing education and awareness.
Transition to **Physical Security**, where you examine practical measures to protect physical IT infrastructure. This module includes a hands-on lab using inSSIDer to illustrate real-world applications of these concepts.
The course then covers **Perimeter Security**, focusing on defenses to protect the outer boundaries of your network. This segment includes a lab component to reinforce theoretical knowledge with practical skills.
**Password Management** highlights the significance of strong, secure passwords. You’ll learn best practices for creating, storing, and managing passwords to mitigate unauthorized access risks.
Subsequently, the **Eliminate Unnecessary Services** class sheds light on identifying and disabling non-essential services that could be potential security vulnerabilities. Labs using Netstat and Nmap provide practical experience with these tools.
Engage in **Patch Management** to ensure systems are up-to-date with the latest security patches. The hands-on lab with Landesk offers a practical understanding of patch deployment.
**AntiVirus** protection is covered extensively, including labs with SonicWALL and EPO to demonstrate installation and configuration techniques.
The course also tackles **Access Control**, instructing on methods to restrict unauthorized access to sensitive data. Techniques for managing Data in Transit are illustrated through a VPN lab, offering critical insights into securing data as it moves across networks.
Explore **Intrusion Prevention Systems (IPS)** with practical labs that detail the setup and use of IPS tools like SonicWALL, designed to preemptively block security threats.
Finally, delve into **Backup** strategies, ensuring data integrity and availability in case of system failures. A lab session using Backupexec completes this in-depth exploration of backup solutions.
This curriculum not only equips you with essential cybersecurity knowledge but also provides ample hands-on practice to apply what you've learned. By the end of the course, you'll be well-versed in multiple aspects of cybersecurity, making you a proficient guardian of digital realms.
Video class: Cyber Security Class: 1 Introduction. Learn Internet Security. CyberSecurity 101
0h02m
Video class: Cyber Security Class: 2 Basic Concepts. Learn Internet Security. Another GeekyVid
0h07m
Exercise: There are many basic concepts about network security, which are also the starting line of this course. Regarding information security, what does the CIA triad stands for?
Video class: Cyber Security Class: 3 Security Policy. Learn Internet Security. Another GeekyVid
0h05m
Exercise: As you move forward in learning about information security and its world, you’ll find yourself meeting Security Policies, that helps to maintain the critical balance of security. Which one of the options below does not belong to the Security Policy along the lines on the video?
Video class: Cyber Security Class: 4 Educate End Users. Learn Internet Security. Another GeekyVid
0h02m
Exercise: _What is more likely to compromise a confidential file in a company?
Video class: Cyber Security Class: 5 Physical Security. Learn Internet Security. Another GeekyVid
0h05m
Exercise: Regarding the subject of implementing physical security, it makes the following question “Is it more likely that a confidential file will be compromised by a blackhat by defeating your firewall, or by a visitor walking up to a PC and copying the file onto a thumbdrive?” Which option makes more sense?
Video class: Cyber Security Class: 6 Physical Security Lab - inSSIDer. Learn Internet Security. Another GeekyVid
0h07m
Exercise: _What is a rogue access point?
Video class: Cyber Security Class: 7 Perimeter Security. Learn Internet Security. Another GeekyVid
0h10m
Exercise: Concerning the firewall configuration, it has a few starting steps. About the Second-generation firewall functionality, what layers does it occurs in the OSI reference model?
Video class: Cyber Security Class: 8 Perimeter Security Lab. Learn Internet Security. Another GeekyVid
0h09m
Exercise: _What is the advantage of using Dell SonicWALL firewalls for this demonstration?
Video class: Cyber Security Class: 9 Password Management. Learn Internet Security. Another GeekyVid
0h05m
Exercise: When developing a password, you must make sure it has a good management, since it is one of the key starting points of your security. Having that in mind, which one of the alternatives are false?
Video class: Cyber Security Class: 10 Eliminate Unnecessary Services. Learn Internet Security. Another GeekyVid
0h04m
Exercise: _What is the purpose of a server listening on a specific service?
Video class: Cyber Security Course: 11 Eliminate Unnecessary Services Lab - Netstat. Learn Internet Security
0h04m
Exercise: _What is the command to check for open ports on a Windows server?
Video class: Cyber Security Course: 12 Eliminate Unnecessary Services Lab - Nmap. Learn Internet Security
0h05m
Exercise: While setting up your own server, one of the thing you may want to avoid is doing extra work. A scanning tool is shown “Nmap”, whats it main function that interest in that purpose the most?
Video class: Cyber Security Class: 13 Patch Management. Learn Internet Security
0h03m
Exercise: Regarding good patch management procedure, that helps preventing attacks from blackhats on any flaw or exploitable that exists in your system. Mark the alternative that is untrue to the procedure itself.
Video class: Cyber Security Course: 14 Patch Management Lab - Landesk. Learn Internet Security
0h03m
Exercise: _What is the key benefit of LANDesk patch management?
Video class: Cyber Security Course: 15 AntiVirus. Learn Internet Security
0h04m
Exercise: Implementing antivirus measures is a must, every workstation should have it to protect itself from a long list of possible virtual threats. Given that, why laptops can be challenging?
Video class: Cyber Security Course: 16 AntiVirus Lab - SonicWALL. Learn Internet Security
0h05m
Exercise: _What are the two types of antivirus available on SonicWALL network security appliance or firewall?
Video class: Cyber Security Course: 17 AntiVirus Lab - EPO. Learn Internet Security
0h04m
Exercise: _What is the main purpose of McAfee Policy Orchestrator (EPO)?
Video class: Cyber Security Course: 18 Access Control. Learn Internet Security
0h04m
Exercise: _What is the principle of least privilege?
Video class: Cyber Security Course: 19 Data in Transit. Learn Internet Security
0h06m
Exercise: As you start securing data in transit, to avoid the activities of black hats, its a must to encrypt it, since it will allow us to achieve diferente goals, that are:
Video class: Cyber Security Course: 20 Data in Transit Lab - VPN. Learn Internet Security
0h06m
2 hours and 7 minutes of online video course
Exercises to train your knowledge
Certificate of course completion
100% free, from content to certificate
This online course can only be accessed through the Cursa App. Download it using the QR code or the links below:
This online course can only be accessed through the Cursa app. Install it using the links below:
Study for free!
Here you never pay! Not even for the certificate, because everything in the app is 100% free!
Improve your resume!
There are more than 4,000 free courses for you to study anything that interests you!
Free Digital Certificate!
Complete the course and issue your internationally recognized Digital Certificate free of charge.
New course
New course
New course
New course
Thousands of online video courses, audio or text courses.
To test your knowledge during online courses
Generated directly from your cell phone's photo gallery and sent to your email
Download our app via QR Code or the links below::.
+ 6.5 million
students
Free and Valid
Certificate with QR Code
48 thousand free
exercises
4.8/5 rating in
app stores
Free courses in
video, audio and text
Course comments: Cyber security
Khadir Sharp
????????????????
Tinyiko malungana
getting more important information ????
Ndaba Monyane
good
Hlangabeza Dlamini
wow this is good
Ali Dhuux
nice course thnks
Shubham Swaraj
very nice course
Emmanuel kehinde
love this, Thank you
Siva Kumar S
nice
Rohit Daulat Bhosale
Superb
lilian mati
nice