• Search...

categories: Technology & Innovation

Business Continuity
Software
Technology
SDG 9: Industry, Innovation and Infrastructure

Introduction to Cybersecurity

Duration: 2 h 8 m / 27 lessons

Level: General

Course Language: Arabic

By the end of this course, you will be able to

  • How cybersecurity works, what the importance of cybersecurity is, and what the different types of security breaches are and how to deal with them.

  • How Kali Linux works, what the difference between web security and network security is, and what digital forensics is and what the skills required for it are.

  • How malware analysis and reverse engineering work and how you can apply what you will learn about them in order to protect yourself from cyber attacks.

Course details

  • 2 h 8 m/27 lessons
  • Last updated: 10/1/2021
  • 11 learning resources
  • Course completion certificate

Course Content

Free lessons

1.

Introduction

3 Minutes
2.

Cyber security overview

3 Minutes
3.

Building our labs/ tools

2 Minutes
learning resources
1.

Introduction

3 Minutes
2.

Cyber security overview

3 Minutes
3.

Building our labs/ tools

2 Minutes
learning resources
4.

Kali Linux Intro 1

6 Minutes
5.

Kali Linux Intro 2

3 Minutes
6.

Web Security 1

3 Minutes
7.

Web Security 2

3 Minutes
learning resources
8.

Introduction to Hypertext Transfer Protocol

7 Minutes
learning resources
9.

Web Browser Is Your Weapon

4 Minutes
10.

Cookies

8 Minutes
11.

Admin Has The Power

9 Minutes
learning resources
12.

Digital Forensics

4 Minutes
13.

Skills Required For Digital Forensics

1 Minutes
14.

File Analysis

5 Minutes
15.

Search In Trash

6 Minutes
learning resources
16.

Network Security

3 Minutes
learning resources
17.

Wireshark

7 Minutes
learning resources
18.

Networkminer

1 Minutes
learning resources
19.

Bflag 1

6 Minutes
learning resources
20.

Bflag 2

3 Minutes
learning resources
21.

Malware Analysis and Reverse Engineering

2 Minutes
22.

SW Reverse Engineering

4 Minutes
23.

Reverse Engineering Tools

2 Minutes
24.

Assembly/ Machine Code

4 Minutes
25.

Registers

1 Minutes
26.

Getting Started Challenge

10 Minutes
learning resources
27.

The Debugger

4 Minutes

About this course

With the increase of cyberattacks, a need for more accurate and robust security and protection strategies has emerged and created the idea of cybersecurity. This course introduces the concept of cybersecurity and the importance of its role in protecting cyberspace. This course will address the mechanisms and methods that cybersecurity professionals use to safeguard the data of individuals, organizations, and countries. You will also be prepared to understand the mindset of hackers, and how to protect data on various devices.

Course requirements and prerequisites

Additional tools to install will be mentioned throughout the course. No prior knowledge of or experience with these tools is needed.

Mentor

Looking for help?