Course Overview

This learning path is designed to give you the knowledge and skills to identify, mitigate, and prevent cybersecurity-related issues. This path is highly practical and designed to follow along at home. By the end of this learning path, you will have a solid understanding of all types of cyber-attacks as well as the basic defensive strategies that need to be adopted against these threats.

What You Will Learn

  • How malicious hackers can turn your social media against you
  • How to identify phishing emails
  • bad links
  • etc.
  • How ransomware
  • worms
  • trojans
  • spyware
  • viruses
  • other types of malware work
  • How to reduce your personal risk to these types of attacks
  • See examples of effective cybersecurity attacks and their devastating outcomes
  • Learn effective techniques to detect and protect against common attacks
  • Setting up a small environment for security testing
  • Bypass passwords using various methods
  • How to identify phishing emails
  • bad links
  • etc.
  • Identify and mitigate the ten most critical security risks

Program Curriculum

Content
  • Chapter 1: Introduction to Physical Security
  • Chapter 2: Securing Operating Systems
  • Chapter 3: Clear Desk and Removable Media Policy
  • Chapter 4: Internet Security
  • Chapter 5: Diving into Malware and Viruses
  • Chapter 6: Security on Social Networking Sites
  • Chapt

Content
  • Chapter 1: Cracking Your First Password
  • Chapter 2: Brute Force Attacks
  • Chapter 3: Dictionary Attacks
  • Chapter 4: Rainbow Table Attacks
  • Chapter 5: The Downside of Passwords
  • Chapter 6: Remedies and Mitigations
  • Chapter 7: Case Studies

Content
  • Chapter 1: Introduction to Virus
  • Chapter 2: Worm: Replicates to Spread Itself
  • Chapter 3: Malicious Intentions of Trojan
  • Chapter 4: Ransomware: Threatens to Publish a Victim's Data in Return of a Handsome Ransom
  • Chapter 5: Adware: The 'Unclosable' Ad Traps

Content
  • Chapter 1: World Wide Web Fundamentals
  • Chapter 2: Injection Flaws
  • Chapter 3: Broken Authentication
  • Chapter 4: Sensitive Data Exposure
  • Chapter 5: XML External Entities
  • Chapter 6: Broken Access Control
  • Chapter 7: Security Misconfiguration
  • Chapter 8: Cross-Si

Content

Chapter

Content

Load more modules

Instructor

Jeff Minakata

Jeff Minakata has worked in the IT industry for over 22 years. He holds various cybersecurity certifications, networking certifications, and engineering certifications such as C|OSINT Certified, trained in CEH v8, CEH v9, CEH v11, CISP, Metasploit certified, Accredited Configuration Engineer (ACE), MCSI OSINT Practitioner, and CWA certified. He is an Online Instructor for OSINT, ethical hacking, and network security. He has contracted courses for EC-Council, Udemy, and has written articles for Hackin9 and eForensics magazine. Jeff currently works on the computer networking side and teaches ethical hacking, OSINT, and cybersecurity online. He is passionate about helping people understand OSINT, ethical hacking, and cybersecurity.

Skylar Simmons

Skylar Simmons is a U.S. Army veteran with over 10 years of security experience supporting various types of organizations, including, government, financial sector, and Fortune 500 companies. He holds a Bachelor’s of Science degree in Cyber Security from University of Maryland University College, along with OSCP, CISSP, and numerous other security and IT certifications.

Lisa Gilbert

Lisa is a CISSP-certified instructor for the United States Air Force for their defensive cyber weapon system. She teaches the operator positions of network management, vulnerability assessment and remediation, client endpoint protection, and storage and virtualization. She is also a medical device cybersecurity consultant for the Food and Drug administration and has been a volunteer in the Biohacking Village at Defcon. She developed a website with technical information for her students and with simple explanations and cybersecurity advice for non-technical people. She explains technical concepts in simple, understandable terms that make the information accessible and usable to all audiences.

Paulo Silva Silva

Paulo Silva holds a bachelor’s degree in computer science and a master in Innovation and Technological Entrepreneurship. With more than 15 years professional experience as software developer, in the last 6 years he has been completely focused on security. Nowadays he is an independent senior security researcher, collaborating with several organizations to find and fix security weaknesses in their systems. Since 2010 Paulo is OWASP’s volunteer contributing to several projects such as the OWASP Top 10 and OWASP API Security Top 10 in which he is the main contributor. He’s also the OWASP Go Secure Coding Practices project leader. Used to attend security conferences all over the world, Paulo is frequently invited to deliver awareness and security training in the academia. He has also authored several security articles and secure programming guides.

Zanidd

Zanidd has over 9 years of experience in Computer Science and is currently working as a Full Stack Engineer. He has worked in a variety of positions ranging from software engineer to security analyst and has a broad range of theoretical and practical experience relating to software and infrastructure creation and security. On his YouTube Channel and blog, he teaches and shows ethical hacking practices, makes software engineering videos and tutorials and reviews books on different topics ranging from security to infrastructure, software engineering and Kubernetes.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Learning Paths

1 of 8

Quick View

Cybersecurity Fundamentals for Beginners

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Cybersecurity Fundamentals for Beginners

Cybersecurity Fundamentals for Beginners