Course curriculum

  • 1

    Welcome to the course!

  • 2

    Module 1 - The Cybersecurity Field

    • Segment - 01 - Introduction
    • Segment - 02 - General overview about Cyber Security
    • Segment - 03 - What Cybersecurity is?
    • Segment - 04 - Cyberstats
    • Segment - 05 - Cybersecurity market size
    • Segment - 06 - Confusions: Cybersecurity or Cyber Security
    • Segment - 07 - Confusions: Cybersecurity vs information security
    • Segment - 08 - Cybersecurity professional roadmap
    • Segment - 09 - Salary
    • Segment - 10 - Top cybersecurity certifications by
  • 3

    Module 2 - Hacker’s techniques and motivations

    • Segment - 11 - Understand hacker’s mindset
    • Segment - 12 - Hackers Categories
    • Segment - 13 - IoT
    • Segment - 14 - What motivates hackers to hack?
    • Segment - 15 - Understand the cybersecurity kill chain - 01
    • Segment - 16 - Understand the cybersecurity kill chain - 02
    • Segment - 17 - Hacking techniques
    • Segment - 18 - Malicious software used by hackers
    • Segment - 19 - [LAB] How hackers generate malicious software?
    • Segment - 20 - [LAB] How to detect that your machine is infected and how to protect yourself?
  • 4

    Module 3 - Cybersecurity law and standards

    • Segment - 21 - Laws and standards that you need to know
    • Segment - 22 - ISO27001
    • Segment - 23 - NIST Framework
    • Segment - 24 - PCI-DSS
    • Segment - 25 - PCI-DSS Compliant
    • Segment - 26 - Laws Introduction
    • Segment - 27 - Cybersecurity USA, EU & Australia Laws
    • Segment - 28 - Last Power
    • Segment - 29 - Last Video