Course curriculum

    1. 1.1: Introduction to Cybersecurity

    2. 1.1 quiz

    3. 1.2: Fundamentals of Information Security

    4. 1.2 quiz

    5. 1.3: Historical Perspectives on Information Security

    6. 1.3 quiz

    7. 1.4: The Significance of Information Security

    8. 1.4 quiz

    9. 1.5: Core Principles of Information Security

    10. 1.5 quiz

    11. 1.6: Understanding Threats in Information Security

    12. 1.6 quiz

    13. 1.7: Safeguarding Computers from Security Threats

    14. 1.7 quiz

    1. 2.1: Technological Impacts on Privacy

    2. 2.1 quiz

    3. 2.2: Economic Implications of Information Technology

    4. 2.2 quiz

    5. 2.3: Privacy Challenges in E-commerce and M-commerce

    6. 2.3 quiz

    7. 2.4: Professional Use of Social

    8. 2.4 quiz

    9. 2.5: Personal Impacts of Social Networking

    10. 2.5 quiz

    11. 2.6: Phishing: Threats and Prevention

    12. 2.6 quiz

    13. 2.7: Understanding Social Engineering

    14. 2.7 quiz

    15. 2.8: Security Challenges in Social Media

    16. 2.8 quiz

    17. 2.9: Surveillance Techniques and Technologies

    18. 2.9 quiz

    19. 2.10: Laws Governing Electronic

    20. 2.10 quiz

    21. 2.11: Legal Aspects of Eavesdropping

    22. 2.11 quiz

    1. 3.1: Exploring Big Data

    2. 3.1 quiz

    3. 3.2: Insights into Big Data Analytics

    4. 3.2 quiz

    5. 3.3: The Process of Data Mining

    6. 3.3 quiz

    7. 3.4: Data Mining and Social Media

    8. 3.4 quiz

    9. 3.5: Privacy Concerns in Big Data

    10. 3.5 quiz

    11. 3.6: Security Risks Associated with Big Data

    12. 3.6 quiz

    1. 4.1: Laws and Regulations in Information Security

    2. 4.1 quiz

    3. 4.2: Cyber Threats to National Security

    4. 4.2 quiz

    5. 4.3: Overview of the Patriot Act

    6. 4.3 quiz

    7. 4.4: Balancing Freedom of Information with National Security

    8. 4.4 quiz

    9. 4.5: Computer Hacking: Context, Prevention, and History

    10. 4.5 quiz

    11. 4.6: Legal Consequences of Computer Hacking

    12. 4.6 quiz

    13. 4.7: Cyber Terrorism: Definitions, Examples, and Countermeasures

    14. 4.7 quiz

    15. 4.8: Cyber War and Advanced Persistent Threats

    16. 4.8 quiz

    17. 4.9: The UK Data Protection Act: An Overview

    18. 4.9 quiz

    19. 4.10: Modern Technology Trends and Skill Requirements

    20. 4.10 quiz

    1. 5.1: Database Management Systems: Functions and Importance

    2. 5.1 quiz

    3. 5.2: Securing Database Systems

    4. 5.2 quiz

    5. 5.3: Roles and Responsibilities in Database Security

    6. 5.3 quiz

    7. 5.4: Preventing Data Tampering

    8. 5.4 quiz

    9. 5.5: Security in Cloud Technologies

    10. 5.5 quiz

    11. 5.6: Cloud Computing and Security Issues

    12. 5.6 quiz

    13. 5.7: Detecting and Protecting Against

    14. 5.7 quiz

    15. 5.8: The Role of Intrusion Detection Systems in Data Security

    16. 5.8 quiz

    17. 5.9: Database Hacking: Understanding the Risks and Defenses

    18. 5.9 quiz

    19. 5.10: Notification Laws for Data Breaches

    20. 5.10 quiz

    21. 5.11: Legal Repercussions of Data Breaches

    22. 5.11 quiz

    1. 6.1: Defining Computer Viruses: Types and Protection Strategies

    2. 6.1 quiz

    3. 6.2: Tracing the History of Computer Viruses

    4. 6.2 quiz

    5. 6.3: Categories of Computer Viruses

    6. 6.3 quiz

    7. 6.4: Understanding Trojan Horse Viruses

    8. 6.4 quiz

    9. 6.5: The Nature and Mitigation of Worm Viruses

    10. 6.5 quiz

    11. 6.6: Techniques for Virus Detection

    12. 6.6 quiz

    13. 6.7: Malware Overview: Types and Examples

    14. 6.7 quiz

About this course

  • $19.00
  • 241 lessons
  • 0 hours of video content

Discover your potential, starting today