Cyber security for absolute beginners, Part 01.

Cyber security applies technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyberattacks. It reduces the risk of cyberattacks and protects against the unauthorized exploitation of systems, networks, and technologies. The first section covers the termin...

Full description

Saved in:
Bibliographic Details
Format: Electronic Video
Language:English
Published: [Place of publication not identified] : Packt Publishing, [2022]
Edition:[2022 edition]
Subjects:
Online Access:CONNECT

MARC

LEADER 00000ngm a22000007i 4500
001 in00006310519
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230110s2022 xx 209 o vleng d
005 20230124160931.0
035 |a 1WRLDSHRon1357158161 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |a 9781837630943  |q (electronic video) 
020 |a 1837630941  |q (electronic video) 
035 |a (OCoLC)1357158161 
037 |a 9781837630943  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230110 
049 |a TXMM 
245 0 0 |a Cyber security for absolute beginners,  |n Part 01. 
250 |a [2022 edition] 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c [2022] 
300 |a 1 online resource (1 video file (3 hr., 29 min.)) :  |b sound, color. 
306 |a 032900 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a video  |b v  |2 rdamedia 
337 |a computer  |b c  |2 rdamedia 
338 |a other  |b vz  |2 rdacarrier 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Alexander Oni, presenter. 
500 |a "Published in December 2022." 
520 |a Cyber security applies technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyberattacks. It reduces the risk of cyberattacks and protects against the unauthorized exploitation of systems, networks, and technologies. The first section covers the terminologies and the trinity of IT security and computer protocols. In the second section, we explore the hackers' world and the methodology. We will look at the different hackers and how they hack. In the next section, the various ways cyber criminals and hackers attack systems and networks are discussed, and you will learn about the popular attack forms, such as phishing, brute force attack, DoS/DDoS attacks, and Bots/Botnets. We will then explore malware and the various malware, such as viruses, worms, and trojans, and how they differ. You will then learn about cybersecurity professional methods to protect systems and networks from cyberattacks and how antiviruses, firewalls, encryptions, biometrics, and authentication methods work. Finally, you will learn about information and cybersecurity topics, such as the BYOD policy and cyber warfare. Upon completion, you will have gained comprehensive knowledge and insights into cyber security and can become cyber/information security professionals. What You Will Learn Explore the hackers' world, methodology, and types Learn about phishing, brute force/DoS/DDoS attacks, and bots/botnets Know about various forms of malware such as viruses, worms, and trojans Know more about firewalls, ransomware, and antiviruses Explore various malware and their effects on computers/networks Understand encryption, biometrics, and authentication methods Audience This is a course for absolute beginners who want to step into the world of cyber/information security. It also caters to students who want extensive knowledge about information security fundamentals and to students and individuals who wish to understand the concepts of computer and cyber security and become IT or cyber security experts. This course is intended primarily for individuals with little to no prior knowledge about cyber security; knowing how to use a computer and the Internet are the prerequisites. About The Author Alexander Oni Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess. 
588 |a Online resource; title from title details screen (O'Reilly, viewed January 10, 2023). 
590 0 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Computer security. 
650 0 |a Cyber intelligence (Computer security) 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Oni, Alexander,  |e presenter. 
710 2 |a Packt Publishing,  |e publisher. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781837630943/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi 
999 f f |s 9dfb72c1-432d-4dec-a501-446d7d71d0ac  |i f547e7e4-b501-4544-9d8b-8c7b7d253c2e  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.A25   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781837630943/?ar  |z CONNECT