Overview
Syllabus
Introduction
Introduction to Cybersecurity
Key Features of Cybersecurity
Applications of Cybersecurity
Advantages of Cybersecurity
Overview of Cyber Security Threats
What are Cyber Threats
Types of Cyber Threats
Cyber threat intelligence
Phishing attack
Password attack
Man-in-the-middle attack
Malware
Cross-site-scripting
SQL Injection Threat
Zero day attack
Man-in-the-Middle MitM Attacks
Denial-of-Service DoS Attacks
SQL Injection
Zero-Day Exploits
Advanced Persistent Threats APTs
Cryptojacking
Overview of Types of Cyber Security
What is Cyber Security
Need of Cyber Security
Types of Cyber Security
Summary on Types of Cyber Security
Introduction to Types of Cybersecurity
Cyber Security and its need
Cyber Threats
Cyber Security Framework and its Types
Introduction to Cyber Security Tools
Types of Cyber Security
Top Cyber Security Tools
Benefits of Cyber Security Tools
Introduction to data privacy
Data Security vs Data Privacy
Data Classification
Introduction to Encryption
Overview of Encryption
Prerequisites to Understand Encryption
Cryptography Vs Encryption
Encryption Vs Decryption
Types of Encryption
Encryption Algorithms and Protocols
What is Brute force attack
Introduction to Cyber Forensics
Overview of Forensics
What is Cyber Forensics
Types of Cyber Forensics
Cyber Forensics Process
Cyber Forensics Tools
Skillsets required
Cyber Forensics Investigator
Challenges in Cyber Forensics
Gen AI and its impact on cybersecurity
Imapct of Gen AI Cybersecurity
Gen AI Tools in Cybersecurity
Gen AI Frameworks in Cybersecurity
Possible Security Threats
Threat Agents
Cyber Kill Chai
Cyber Security and its need
Cyber Security certifications
CompTIA: Security
Importance of Cybersecurity
Cyber attacks & Threats
Threat Agents
Cyber kill Chain
Cybersecurity strategy
FAQs
Summary
Taught by
Great Learning