Introduction to Cybersecurity

Video description

Cybercrime is on the rise, with a total of 1.2 billion dollars lost to phishing attacks in 2018 alone (IC3) with 7.3 billion dollars lost to ransomware attacks in 2019 (Emsisoft). The threat landscape has grown significantly over the years targeting large businesses, health care, school, home users, and small businesses. How do we tackle this growing problem?

This course is designed to give you the knowledge and skills to identify, mitigate, and prevent cybersecurity-related issues. The course is highly practical and designed to follow along at home.

By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work.

Table of contents

  1. Chapter 1: Introduction to Physical Security
    1. Course Overview
    2. Getting Started with Physical Security
    3. Understanding Tailgating
    4. Dumpster Diving
    5. Securing Your Computer
    6. Physical Locks for Your Server Room
  2. Chapter 2: Securing Operating Systems
    1. Best Practices for Patch Management
    2. Exploring What Makes a Good Password
    3. Using a Password Manager
    4. Understanding Best Practices for Application Software
    5. Why Is Firewall Important?
    6. Staying Up-to-Date with Driver Updates
  3. Chapter 3: Clear Desk and Removable Media Policy
    1. Learning Best Practices for Passwords
    2. USB Safety with Examples
    3. Physically Secure Important Media
    4. Secure Disposal of Physical Documents and Storage Media
  4. Chapter 4: Internet Security
    1. Importance of HTTP versus HTTPS
    2. Downloading Precautions and Hash Checking
    3. Looking at Fake Error Messages (Scareware)
    4. Exploring Useful Browser Plugins
    5. Understanding How Tor, the Onion Browser, Can Help Hide Your Internet Surfing
  5. Chapter 5: Diving into Malware and Viruses
    1. Introduction to Viruses
    2. Understanding How Computers Can Become Infected
    3. Learning Best Practices for Antivirus Software and Malware Scanners
    4. What to Do If You Are Infected with Cryptoware?
  6. Chapter 6: Security on Social Networking Sites
    1. Being Careful of What You Post
    2. Beware of Social Engineering Quizzes
    3. Identifying Bots on Twitter
  7. Chapter 7: Securing E-mail Communication
    1. Looking at End-to-end Encrypted E-mail Service
    2. Do Not Use Your E-mail for Storage
    3. Learning How to Identify and Find Phishing E-mails
    4. Understanding Best Practices for Unusual E-mails
  8. Chapter 8: Securing Mobile Devices
    1. Importance of Protecting Your Phone
    2. Best Practices for Downloading Apps
    3. Looking at an Application Designed to Help Secure Your Phone
    4. Understanding How to Use Sudo
    5. Additional Settings
  9. Chapter 9: Securing the Cloud
    1. Know Your Options for Data Encryption
    2. Knowing Everything About 2-factor Authentication
    3. Checking if Your Cloud Server is Leaking Data
  10. Chapter 10: Network Connections
    1. Getting to Know Everything about VPN
    2. Changing Your DNS Connection to Avoid ISP Snooping
    3. Understanding Password Reset Requests
    4. Learning How to Use TorGhost
  11. Chapter 11: Data Backup and Disaster Recovery
    1. Why Backups Are Important?
    2. Why We Backup Three Times?
    3. Understanding Backup Methods

Product information

  • Title: Introduction to Cybersecurity
  • Author(s): Jeff Minakata
  • Release date: July 2020
  • Publisher(s): EC-Council
  • ISBN: None