Get $1 credit for every $25 spent!

The Comprehensive Beginner's Guide to Cybersecurity Bundle

Ending In:
Add to Cart - $29.99
Add to Cart ($29.99)
$800
96% off
wishlist
(14)
Courses
4
Lessons
187
Enrolled
138

What's Included

Product Details

Access
Lifetime
Content
2.0 hours
Lessons
46

Absolute Beginners Guide to Cybersecurity, Part 1: Basic Concepts

Gain Fundamental Knowledge & Jump Start Your Career as an InfoSec Professional

By Alexander Oni | in Online Courses

Have you ever wondered exactly how hackers hack? Do words like firewalls, encryption, biometrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cybersecurity in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you. This 2-hour course will walk you through basic cybersecurity terminologies, concepts, and protocols and move on to hacking methods, malware types, and the processes employed by cybersecurity professionals to defend networks and systems from attacks.

  • Access 46 lectures & 2 hours of content 24/7
  • Understand the basic terminologies & topics like the trinity of IT security and computer protocols
  • Explore the world of hackers & hacking methodologies
  • Know the various ways how cybercriminals & hackers attack systems and networks
  • Learn the various forms of malware such as viruses, worms & trojans and how they differ from one another
  • Learn about the methods employed by cybersecurity professionals to protect systems & networks from cyber attacks
  • Explore topics related to both information & cybersecurity such as the BYOD policy and cyber warfare

"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec." – Chris Loyola

Best-selling instructor Alexander Oni’s passion is teaching people through online courses in a fun and entertaining manner. He’s been teaching online for about 3 years now and during this period and has created over 25 different courses with more than 50,000 students registered worldwide.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program

  • General Introduction to Cyber Security

    • Welcome to the Course - 1:59
    • Difference Between Information and Cyber Security - 2:37
    • The CIA Triad - 3:11
    • Basic Terminologies
    • Computer Protocols - 7:04
    • Cookies
    • TCP/IP - 3:32
  • Mind of a Hacker

    • World of Hacking Section Intro - 0:57
    • What is NOT Hacking - 4:26
    • Hacking Methodology - 3:47
    • Types of Hackers - 7:18
    • The WhoIS Query - 5:39
    • Social Engineering - 3:36
  • Attacks

    • Attacks Section Intro - 0:49
    • Brute Force Attacks - 4:17
    • Phishing and Spoofing - 5:14
    • Bots and Botnets - 3:27
    • DoS and DDoS Attacks - 4:44
    • Pings - 3:25
    • Man in the Middle Attack - 4:18
    • SQL Injection Attack - 5:01
  • Malware

    • Malware Section Intro - 1:03
    • Viruses and Worms - 4:51
    • Trojans - 7:19
    • Adware and Spyware - 3:59
    • Ransomware - 7:15
    • Other Types of Malware - 3:38
  • Defences

    • Defences Section Intro - 0:42
    • How an Antivirus Works - 4:34
    • Encryption - 3:07
    • Firewalls - 4:13
    • Biometrics - 3:14
    • Factor Authentication Methods - 4:54
    • Honeypots and DMZs - 5:07
    • Wireless Security - 2:08
    • Password Management - 6:27
  • Information Security at the Work Place

    • BYOD - 3:06
    • A Sample BYOD Policy - 6:15
    • The Security vs Ease of Access Paradox - 3:07
    • The Weakest Link and The Disgruntled Employee - 2:02
  • Cyber Warfare and Cyber Attacks Against Companies

    • Cyberwarfare - 2:25
    • The Attack Against Estonia - 6:30
    • Stuxnet - The Attack Against Iran - 4:29
    • The Sony Pictures Hack - 3:31
  • Conclusion

    • Biggest Myths of Online Security - 7:01
    • Conclusion - 1:48

View Full Curriculum


Access
Lifetime
Content
6.0 hours
Lessons
87

Absolute Beginners Guide to Cybersecurity, Part 2: Networks & Privacy

Develop Your Basic Cybersecurity Skills & Prepare Yourself for Entry-Level Roles

By Alexander Oni | in Online Courses

Take your basic knowledge of cybersecurity to a whole new level with this exciting course that promises to be educational, informative and fun-filled. With 87 lectures, this class will build upon a basic foundation in Cyber Security with a strong focus on core topics like networking, privacy & anonymity, malware, email security, backups & encryption, and Windows 10 hardening. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cybersecurity field if you so wish.

  • Access 87 lectures & 6 hours of content 24/7
  • Understand how a lot of security technologies work behind the scenes
  • Learn all the latest techniques used in the world of cybersecurity today
  • Use a wide variety of software to improve your security game including VPNs, Kaspersky Antivirus, Bitlocker, & more
  • Prepare yourself for entry-level roles w/ a solid set of cybersecurity skills

"Getting more exciting! Learning more! Alex is extremely professional in the way he delivers the content. I will recommend this course to anyone!" – Ian Chebe

Best-selling instructor Alexander Oni’s passion is teaching people through online courses in a fun and entertaining manner. He’s been teaching online for about 3 years now and during this period and has created over 25 different courses with more than 50,000 students registered worldwide.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Any device with basic specifications

Course Outline

  • Networking 101
    • Section Intro - 1:03
    • Meet Julian Assange - 1:49
    • MAC Addresses & IP Addresses - 7:36
    • Hubs Switches and Routers - 5:20
    • Ethernet 101 - 2:34
    • HTTP, HTTPS, SSL and TLS - 6:29
    • The Internet Protocol Suite - 6:47
    • The DNS System - 6:22
    • Section Review & Keypoints
  • The Internet - Privacy & Survival of the Paranoid
    • Section Intro - 1:22
    • What is Privacy, Anonymity and Pseudonymity - 4:38
    • Identity Strategies - 10:37
    • How We Are Tracked Online - 5:18
    • FaceBook vs Cambridge Analytica Scandal - 7:45
    • Exercise - How muc data does Facebook have on me - 3:18
    • 5 Places You are Being Tracked - 4:16
    • Browsing Incognito - 3:55
    • Introduction to DuckDuckGo - 6:25
    • Introduction to Brave Browser - 4:20
    • How to Delete Your Online Accounts - 4:08
    • How to Disappear Online - 3:56
    • Introduction to Stylometry - 6:02
    • Section Review & Key Points
  • Anonymizers, Proxies, Virtual Private Networks & Tor
    • Section Intro - 0:55
    • Anonymizer - 3:52
    • Introduction to Proxy Servers - 7:19
    • Introduction to Virutal Private Networks - 4:52
    • Types of VPNs - 6:16
    • NordVPN - 7:46
    • VPN Myths Debunked - 6:40
    • Using Tor - 9:57
    • Tor Weaknesses - 5:03
    • Attacking Tor - 4:40
    • The Dark Web - 8:15
    • Dark Nets - 3:24
    • Combining VPN and Tor - 5:13
    • Meet Eldo Kim - 1:52
    • Section Review & Keypoints
  • Malware, Viruses, Rootkits, Ransomware & Attacks
    • Secdtion Intro - 0:46
    • Introduction to Malware - 4:52
    • Choosing an Antivirus Software - 8:34
    • Rootkits - 5:06
    • Securing the Windows 10 Boot Process - 5:27
    • Using GMER - Rootkit Scanner - 1:39
    • Ransomware - 8:00
    • Using the builtin Antiramsomware Tool - 2:14
    • Using the CCleaner Software - 7:57
    • Using Bleachbit - 3:50
    • Malwarebytes - 6:35
    • Section Review & Key Points
  • Backups, Storage, The Cloud and Encryption
    • Section Intro - 0:54
    • How to Backup Windows 10 - 4:26
    • Introduction to Cloud Computing - 9:39
    • Encryption and Decryption - 4:24
    • Encryption with Veracrypt - 9:22
    • Encryption with Bitlocker - 2:06
    • MAC Encryption with Filevault - 0:57
    • Self Encrypting Drives - 0:44
    • Encryption Attacks and Mitigations - 6:02
    • How to Password Protect USB Drives & Folders - 10:46
    • Section Review & Key Points
  • Social engineering - Scams, cons, tricks and fraud
    • Section Intro - 0:49
    • Introduction to Social Engineering - 10:30
    • Reconnaissance - 8:42
    • Anatomy of a Social Engineering Attack - 8:50
    • The Way Back Machine - 3:43
    • Meet Kevin Mitnick - 1:38
    • Section Review & Key Points
  • The World of Electronic Mails - Dangers, Attacks & Protection
    • Section Intro - 1:09
    • Email Basics, Ports & Protocols - 6:01
    • How to Track Sent Emails - 3:10
    • How to Detect Email Tracking - 2:38
    • Using Guerrilla Mail - 4:38
    • Using Proton Mail - 4:13
    • Phishing Attacks - 5:12
    • Email Scam - 7:32
    • Section Review and Key Points
  • Windows 10 Hardening, Privacy & Security
    • Section Intro - 0:25
    • Patching and Updates - 4:22
    • Turning off ad tracker - 2:29
    • Restricting Cortana - 3:22
    • Turning off Location Tracking - 3:12
    • Turning off Peer Updates - 3:43
    • The Windows 10 Firewall - 2:22
    • The Windows 10 Smart Screen Filter - 2:39
    • Randomizing the MAC Address - 2:07
  • Conclusion
    • Conclusion - 0:54

View Full Curriculum


Access
Lifetime
Content
1.0 hours
Lessons
27

Absolute Beginners Guide to Cybersecurity, Part 3: Mobile Security

Basic to Advanced Techniques to Protect Mobile Devices Against Malware & Hackers

By Alexander Oni | in Online Courses

In a world where smartphones and other mobile devices generate over 52% of all internet traffic, the security of such mobile devices has never been more important. In this short but intensive course, you are going to learn practical skills and techniques to protect your mobile device against hackers and malware. Designed for both Android and iOS users, this class covers techniques and applications for both platforms.

  • Access 27 lectures & 1 hour of content 24/7
  • Work w/ Malwarebytes, one of the best anti-malware apps
  • Learn how to backup your mobile device
  • Install & configure a virtual private network on your mobile device
  • Safely access free public Wi-Fi networks
  • Properly tweak & change the default security settings

"This course was informative and helped me navigate a few menus within my Android securing my phone further." – Gregory Robertson

Best-selling instructor Alexander Oni’s passion is teaching people through online courses in a fun and entertaining manner. He’s been teaching online for about 3 years now and during this period and has created over 25 different courses with more than 50,000 students registered worldwide.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Any device with basic specifications

Course Outline

  • The World of the Mobile Device
    • Welcome to the Course - 1:43
    • Android vs IOS vs BlackBerry - 2:36
    • Mobile Usage Stats - 1:00
  • Understanding Applications
    • Introduction to Mobile Applications - 1:51
    • Google Play Store vs Apple App Store - 4:22
    • How to Identify Legit Apps - 12:25
    • Whatsapp Scam - 2:53
    • The Truth about Jail Breaking the IOS - 7:32
    • Understanding App Permissions - 5:16
    • Checking Default Android App Permissions - 5:42
    • How to Check for App Permissions IOS - 2:01
    • 4 Tips to Working Safely with Apps - 2:34
  • Mobile Threats & Countermeasures
    • Mobile Malware Introduction - 1:57
    • Mobile Ransomware - 3:21
    • Removing Ransomware - 2:57
    • Mobile Trojans - 3:31
    • Mobile Viruses and Spyware - 2:44
    • Symptoms of Mobile Malware Infection - 2:06
    • How to Use Malwarebytes - 6:27
  • Mobile Security Apps
    • Introduction to Mobile VPNs - 2:39
    • Using NordVPN - 5:28
    • How to Access FREE Public Wifi Safely - 2:29
    • Android Security Tweaks - 3:13
    • Find my Android Device - 4:27
    • Find my Iphone - 2:04
  • Conclusion
    • Top 10 Mobile Security Tips - 5:04
    • Mobile Cyber Security Conclusion - 1:05

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
27

The Absolute Beginners Guide to Personal Cyber Security

The Most Effective Tools & Strategies to Ensure Your Privacy Online

By Alexander Oni | in Online Courses

The internet is a nasty place. Everywhere you go, there are hackers and malware just waiting for the right opportunity to steal your important information and corrupt your computer files. It's not just cyber criminals coming after you though, we have also got companies and advertisers invading your privacy and tracking your every move on the internet. As such, there has never been a more important time for you to start taking your personal security online seriously. This course will show you real-life life examples of different types of hacking attacks and how best to tackle them, with no IT or cybersecurity background needed.

  • Access 27 lectures & 2 hours of content 24/7
  • Create & manage the strongest types of passwords
  • Stay safe while using the internet
  • Ensure your privacy so advertisers cannot track you
  • Secure your social media accounts including Facebook & LinkedIn

"Great course for beginners and straight to the point, no fluff."

– Anthony Lewis
Best-selling instructor Alexander Oni’s passion is teaching people through online courses in a fun and entertaining manner. He’s been teaching online for about 3 years now and during this period and has created over 25 different courses with more than 50,000 students registered worldwide.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Course Outline

  • Welcome
    • Introduction - 3:46
  • Internet & Browsing Security
    • HTTP and HTTPS - 4:20
    • Understanding Web Cookies - 9:09
    • VPNs - 8:01
    • Internet Privacy Tools - 6:38
    • Sextortion - 9:06
  • Personal Security
    • Malware - 10:07
    • Personal Password Management - 8:02
    • Password Managers - 4:24
    • 2 Factor Authentication - 7:37
    • Backups - 4:26
    • Personal Disaster Recovery Plan - 3:17
    • Have I been Pwned - 3:33
  • Social Media Security & Email Security
    • Facebook Security - 8:22
    • LinkedIn Security - 8:36
    • Social Media Ethics - 7:24
    • Phishing Attacks - 8:54
    • Email Data Management - 4:44
  • Mobile Security
    • Mobile Intro - 1:49
    • Understanding App Permissions - 5:16
    • Checking Default Android App Permissions - 5:42
    • How to Check for App Permissions IOS - 2:01
    • How to Identify Legit Apps - 12:25
  • Conclusion
    • You have Been Hacked - 7:17
    • Security Checklist
    • Summary
    • Conclusion - 0:49

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.