Cyber Security

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, theft, and damage. It involves a range of measures, including the use of software, hardware, and policies to safeguard information and ensure the integrity, confidentiality, and availability of data. Key components of cybersecurity include risk management, threat detection and response, access control, encryption, and user education. As cyber threats evolve, cybersecurity remains crucial for organizations and individuals to defend against breaches, malware, and other cybercriminal activities.

Cyber Security

1
CS Cyber Crime
10 minutes

Criminal activities involving computers or networks, where systems are targeted or used as tools for illegal actions.

2
Increasing Crime
10 minutes

Increasing crime refers to the growing incidence of unlawful activities in a specific area or context, often indicating a rise in criminal behavior or trends over time.

3
CS Money Making Threats
10 minutes

Tactics used by cybercriminals to exploit systems and individuals for financial gain, such as ransomware, fraud, and phishing schemes.

4
CS Dark Web
10 minutes

A part of the internet that is not indexed by search engines and requires specific software to access, often associated with illegal activities and anonymous communication.

Networking

1
CS Networking Basics
10 minutes

The fundamental concepts and principles that underpin the design, implementation, and management of computer networks, including hardware, protocols, and communication methods.

2
The OSI Model
10 minutes

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to understand and standardize the functions of a networking system across different communication systems.

3
Networking basics layers
10 minutes

The structured framework that organizes the various functions and processes of computer networking into distinct levels for better understanding and management.

4
CS Network Layer
10 minutes

The Network Layer is responsible for routing packets between devices across different networks and ensuring data is sent from the source to the destination efficiently.

5
Different Networks
10 minutes

Different networks refer to various types of interconnected systems, including local area networks (LANs), wide area networks (WANs), metropolitan area networks (MANs), and others, each serving distinct purposes and scales.

6
NAT
10 minutes

Network Address Translation (NAT) is a method that modifies IP address information in packet headers while they are in transit, enabling multiple devices on a local network to share a single public IP address for accessing the internet.

7
IPv6
10 minutes

IPv6 is the latest version of the Internet Protocol, designed to replace IPv4, featuring a larger address space, improved routing, and enhanced security.

8
ICMP
10 minutes

ICMP (Internet Control Message Protocol) is a network layer protocol used for sending error messages and operational information, such as diagnostics and routing issues, between network devices.

9
CS Network Transport
10 minutes

CS Network Transport refers to the methods and protocols used to facilitate communication and data transfer between computers in a network, ensuring reliable and efficient delivery of information.

10
Spoofing Traffic
10 minutes

Spoofing traffic is the act of disguising communication from an unknown source as being from a trusted source.

11
UDP
10 minutes

UDP (User Datagram Protocol) is a connectionless transport layer protocol that enables fast, low-overhead transmission of data without the reliability and ordering guarantees provided by TCP.

12
CS Firewalls
10 minutes

Firewalls are security devices or software that monitor and control incoming and outgoing network traffic based on predefined security rules.

13
Firewall Administration
10 minutes

Firewall administration involves configuring, managing, and monitoring firewall systems to ensure network security and compliance with security policies.

14
segmentation
10 minutes

Segmentation is the practice of dividing a network into smaller, isolated sections to enhance security, improve performance, and manage traffic more effectively.

15
IPS
10 minutes

An Intrusion Prevention System (IPS) is a network security technology that monitors network traffic for suspicious activity and can take action to block or mitigate threats in real time.

16
Content and Application Filtering
10 minutes

Content and application filtering is the process of monitoring and controlling access to specific content or applications on a network based on predefined policies to enhance security and productivity.

17
Applications
10 minutes

Applications are software programs designed to perform specific tasks or functions for users, ranging from productivity and communication to entertainment and data management.

18
Content Control
10 minutes

Content control is the practice of managing and regulating access to specific types of content on a network to ensure compliance with policies and enhance security.

19
Decrypting Traffic
10 minutes

Decrypting traffic is the process of converting encrypted data back into its original, readable format to allow analysis or use by authorized parties.

20
CS Web Applications
10 minutes

Web applications are software programs that run on web servers and are accessed through a web browser, enabling users to interact with them over the internet.

21
HTTP Headers
5 minutes

HTTP headers are key-value pairs sent between a client and server in HTTP requests and responses, providing essential information about the request, response, or resource being communicated.

22
HTTP Request Headers
5 minutes

HTTP request headers are key-value pairs sent by a client to a server in an HTTP request, conveying important information about the request and the client's environment.

23
HTTP Response Headers
5 minutes

HTTP response headers are key-value pairs sent by a server back to a client in an HTTP response, providing important information about the response, such as content type, status codes, and caching directives.

24
HTTP Verbs
10 minutes

HTTP verbs are methods used in HTTP requests to specify the desired action to be performed on a resource, such as GET, POST, PUT, and DELETE.

25
Sessions & State
10 minutes

Sessions track user data across multiple requests, while state refers to the current condition or data of an application at a specific moment.

Cyber Attacks

1
CS Mapping & Port Scanning
10 minutes

Mapping is the process of discovering and documenting the structure and services of a network, while port scanning involves probing a network to identify open ports and services running on them.

2
Port Scanning
10 minutes

Port scanning is the process of systematically probing a networked device to identify open ports and the services running on them.

3
UDP Port Scanning
10 minutes

UDP port scanning is the process of sending UDP packets to target ports to determine which ports are open or closed, helping to identify active services on a network.

4
Nmap Timing options
10 minutes

Nmap timing options allow users to adjust the speed and stealthiness of scans by controlling the timing of packet transmission and response, balancing between speed and the likelihood of detection.

5
CS Network Attacks
10 minutes

Network attacks are deliberate attempts to disrupt, compromise, or gain unauthorized access to a network's resources or data, often targeting vulnerabilities in network protocols, devices, or configurations.

6
Return Pointer
5 minutes

The Return Pointer is a memory address that tells the CPU where to resume execution after a function call.

7
C program
10 minutes

A buffer overflow in C occurs when input exceeds the size of a fixed array, overwriting adjacent memory like the Return Pointer, potentially allowing attackers to control the CPU's execution.

8
Vulnerability Scanners
10 minutes

Vulnerability scanners are automated tools designed to identify security weaknesses and vulnerabilities in software, systems, and networks.

9
Network Monitoring
10 minutes

Network monitoring is the continuous observation and analysis of network traffic and performance to ensure optimal operation and security of networked systems.

10
Peer to peer traffic
10 minutes

Peer-to-peer (P2P) traffic refers to direct data exchange between devices on a network without the need for a centralized server, allowing users to share files and resources directly with each other.

11
CS Web Application Attacks
10 minutes

Web application attacks are attempts to exploit vulnerabilities in web applications to gain unauthorized access, manipulate data, or disrupt services.

12
Eve
5 minutes

Eve is a hypothetical attacker in cybersecurity scenarios, often used to illustrate how vulnerabilities can be exploited to access unauthorized data or systems.

13
Avoiding "Magic Numbers"
10 minutes

Avoiding "Magic Numbers" refers to the practice of not using hard-coded numerical values in programming, which can lead to security vulnerabilities like IDOR; instead, developers should use unique identifiers like GUIDs or UUIDs to enhance security.

14
SQL Injection
10 minutes

SQL Injection is a security vulnerability where an attacker manipulates a query by injecting malicious SQL code into user inputs, allowing unauthorized access to the database.

15
Example of SQL Injection
10 minutes

SQL Injection is a security vulnerability where an attacker manipulates a query by injecting malicious SQL code into user inputs, allowing unauthorized access to the database.

16
XSS ("Cross-Site Scripting")
10 minutes

XSS (Cross-Site Scripting) is a web vulnerability that allows attackers to inject malicious scripts into webpages viewed by other users, enabling data theft or session hijacking.

17
XSS example
10 minutes

XSS (Cross-Site Scripting) is a security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, enabling unauthorized actions or data theft.

18
HTML Encoding
10 minutes

HTML encoding is the process of converting special characters into their corresponding HTML entities to ensure they are displayed correctly in a web browser and to prevent security risks like cross-site scripting (XSS).

19
CS Wi-Fi Attacks
10 minutes

Wi-Fi attacks are security breaches that exploit vulnerabilities in wireless networks to gain unauthorized access, intercept data, or disrupt services.

20
WIFI Security
10 minutes

Wi-Fi security refers to the measures and protocols implemented to protect wireless networks from unauthorized access, data breaches, and other cyber threats.

21
MAC Address Filtering
10 minutes

MAC Address Filtering is a security method that restricts network access to devices with specific, pre-approved MAC addresses.

22
Enterprise Authentication
10 minutes

Enterprise Authentication is a secure network access method using centralized authentication servers, such as RADIUS or LDAP, to manage user credentials and permissions for Wi-Fi and other services.

23
CS Passwords
10 minutes

Passwords are secret strings of characters used to authenticate a user and grant access to systems, accounts, or data.

24
Password Managers
10 minutes

Password managers are tools that securely store and manage user passwords, allowing for the generation of strong, unique passwords for different accounts while simplifying access through a single master password.

25
Password Guessing
10 minutes

Password Guessing is the process of attempting unauthorized access to an account or system by systematically trying different password combinations, often using common passwords, personal information, or automated tools.

26
Password Guessing Example
10 minutes

Password guessing is a security attack where an attacker attempts to gain unauthorized access to an account by systematically trying various password combinations until the correct one is found.

27
Credential Stuffing
10 minutes

Credential stuffing is a cyber attack method where attackers use stolen username and password pairs from one breach to gain unauthorized access to accounts on different services, exploiting users' tendency to reuse credentials.

28
Penetration Testing & Social Engineering
10 minutes

Penetration Testing: A security practice where testers simulate attacks on a system to identify vulnerabilities.Social Engineering: The manipulation of people into divulging sensitive information or performing actions that compromise security.

29
No-knowledge, Partial-knowledge and Full-Knowledge Penetration testing
10 minutes

No-knowledge, Partial-knowledge, and Full-knowledge penetration testing are approaches where the tester has no information, limited information, or complete access to the system, respectively, to identify vulnerabilities and assess security.

30
Social Engineering
10 minutes

Social engineering is a manipulation technique that exploits human psychology to deceive individuals into divulging confidential information or performing actions that compromise security.

31
Social Engineering Scenario: Using fear
10 minutes

A social engineering scenario using fear involves an attacker impersonating an authority figure to manipulate victims into complying with requests under the threat of negative consequences, such as job loss or disciplinary action.

32
Phishing
10 minutes

Phishing is a cyber attack where attackers impersonate legitimate entities to trick individuals into providing sensitive information, such as passwords or financial details, typically through fraudulent emails or websites.

33
Vishing
10 minutes

Vishing, or voice phishing, is a social engineering attack where attackers use phone calls to trick individuals into revealing sensitive information, such as personal details or financial data.

34
Vishing Example
5 minutes

A common vishing example involves an attacker impersonating an IT manager over the phone, convincing an employee to provide their login credentials for a supposed system update.

Cyber Defence

1
CS Security Operations
10 minutes

Security Operations: The continuous monitoring and analysis of an organization’s security posture to detect, respond to, and mitigate security threats and incidents.

2
SOC Staffing
10 minutes

SOC staffing refers to the process of recruiting and organizing personnel in a Security Operations Center (SOC) to monitor, detect, and respond to cybersecurity incidents effectively.

3
SOAR
10 minutes

SOAR (Security Orchestration, Automation, and Response) is a cybersecurity approach that integrates tools and processes to streamline security operations, automate incident response, and enhance threat management.

4
Escalation Chains
10 minutes

Escalation Chains: A structured process that outlines the steps and individuals involved in escalating issues or incidents within an organization, ensuring timely and effective responses to security threats.

5
What to monitor?
10 minutes

What to Monitor?: The critical assets, systems, and activities within an organization that require oversight to detect anomalies, security threats, and ensure compliance with policies and regulations.

6
CS Incident Response
10 minutes

CS Incident Response: The systematic approach to managing and mitigating the effects of a cybersecurity incident, involving preparation, detection, analysis, containment, eradication, recovery, and lessons learned to improve future defenses.

7
PICERL - A Methodology
10 minutes

PICERL is a cybersecurity methodology that stands for Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned, used to effectively manage and respond to security incidents.

8
Containment
10 minutes

Containment is the process of isolating a security threat to prevent it from spreading further within a system or network during an incident response.

Be the first to add a review.

Please, login to leave a review
Start course
Enrolled: 266 students
Lectures: 71
Level: Beginner

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Cyber Security