8 Chapters ·
34 Lessons ·
0
2215
3546
4817
2433
923
701
786
-
-
C0.01: Welcome to your learning journey!
-
C0.02: What is Learnio?
-
C0.03: Setting goals
-
C0.04: Join our Community
-
C0.05: How it works: Assignments
-
-
C1.01: Course Introduction
-
C1.02: Understanding Cybersecurity: Definitions and Importance
-
C1.03: Evolution of Cyber Threats
-
C1.04: Overview of Cybersecurity Frameworks and Standards
-
C1.05: Concept of Privacy, Anonymity and Pseudonymity
-
-
C2.01: Definition of Hackers, crackers, and cyber criminals
-
C2.02: Malware - Types and Prevention
-
C2.03: Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
-
C2.04: Spyware, Adware, Scareware, PUPs & Browser hijacking
-
C2.05: Spamming (Can be combined with social engineering)
-
C2.06: What are Backdoors
-
-
C3.01: Introduction to the 7-layer OSI model
-
C3.02: TCP/IP model (Discuss the difference between TCP/IP and OSI)
-
C3.03: Encryption: Principles and Methods (Symmetric and Asymmetric)
-
C3.04: Authentication and Access Control
-
C3.05: Firewalls and Network Security
-
C3.06: SSL and TSL (Secure Socket Layer and Transport Layer Security)
-
C3.07: HTTPS
-
C3.08: Digital Certificates
-
C3.09: Digital Signatures
-
C3.10: End-to-end encryption
-
-
C4.01: Password Management and Multi-Factor Authentication
-
C4.02: Secure Browsing and Email Practices
-
C4.03: Software Updates and Patch Management (Both mobile and PC)
-
-
C5.01: Risk Assessment and Mitigation Strategies
-
C5.02: Incident Response Planning and Execution
-
-
C6.01: Real-world examples and case studies illustrating cybersecurity principles
-
-
C7.01 Review of key concepts covered in the course
-
C7.02: Final assessment to evaluate understanding and knowledge gained