Introduction to Cybersecurity

⚡ With these basics, you’ll have a solid foundation in cybersecurity.

IntermediateDevelopment34 hours

Course Description

1. Introduction to Cybersecurity

  • Cybersecurity = protecting computers, networks, and data from attacks.

  • Importance: Prevents identity theft, financial loss, and data breaches.

  • Key security goals: CIA Triad

    • Confidentiality – keeping data private.

    • Integrity – ensuring data isn’t altered.

    • Availability – systems/data are accessible when needed.

2. Types of Cyber Threats

  • Malware – viruses, worms, trojans, ransomware.

  • Phishing – fake emails or messages tricking you into giving personal info.

  • Man-in-the-Middle (MITM) – attacker intercepts communication.

  • Denial of Service (DoS/DDoS) – flooding a system to make it unavailable.

  • SQL Injection / XSS – exploiting website vulnerabilities.

3. Common Cyber Attacks

  • Password attacks: brute force, dictionary, credential stuffing.

  • Social engineering: tricking people (not systems).

  • Insider threats: employees misusing access.

  • Zero-day exploits: attacks on unknown vulnerabilities.

4. Basic Cybersecurity Practices

Strong Passwords – use long, unique passwords + password managers.
Two-Factor Authentication (2FA) – adds an extra security layer.
Regular Updates – keep OS, apps, and antivirus patched.
Firewall & Antivirus – first line of defence.
Safe Browsing – avoid suspicious links/downloads.
Backups – always keep data backed up offline/secure cloud.

5. Network Security Basics

  • Firewalls – block unauthorised access.

  • VPNs – encrypt internet traffic.

  • Wi-Fi Security – use WPA3/WPA2, strong router passwords.

  • Intrusion Detection/Prevention (IDS/IPS) – monitor suspicious traffic.


6. Cybersecurity Tools

  • Antivirus software (e.g., Windows Defender, Bitdefender).

  • Wireshark – network packet analysis.

  • Nmap – network scanning.

  • Kali Linux – penetration testing tools.

  • Password managers – LastPass, Bitwarden, 1Password.


Course Content

3 chapters | 12 Lessons

Malware – viruses, worms, trojans, ransomware.

Lesson 1

Phishing – fake emails or messages tricking you into giving personal info.

Lesson 2

Man-in-the-Middle (MITM) – attacker intercepts communication.

Lesson 3

Denial of Service (DoS/DDoS) – flooding a system to make it unavailable

Lesson 4

SQL Injection / XSS – exploiting website vulnerabilities.

Lesson 5

Price:$194.00

What you will get:

Course Duration

34 hours

Difficulty Level

Intermediate

Category

Development

Total Lessons

12 Lessons

This course includes:

  • Full lifetime access
  • Access on mobile and desktop
  • Certificate of completion

30-day money-back guarantee