Setup Menus in Admin Panel

  • No products in the basket.

The Absolute Beginners Guide to Information & Cyber Security

Learn all the basic concepts and gain valuable insights into the world of Information and Cyber security

What Will I Learn?

  • Understand the basic concepts and terminologies used in the information and cyber security fields
  • Take up entry roles for IT and Cybersecurity Positions
  • Differentiate between the various forms of malware and how they affect computers and networks
  • Understand how hackers actually hack


  • You should know how to use a computer
  • You should know how to use the internet


Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.

This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.

Over 160 happy students have enrolled in this best seller course which has an average rating of 4.5 due to stellar reviews.


This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security.

In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols. In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack. Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as

  • Phishing
  • Brute Force Attack
  • DoS & DDoS Attacks
  • Bots and Botnets
  • and much more

We will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another. In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work

  • Antivirus
  • Firewalls
  • Encryption
  • Biometrics
  • Authentication Methods
  • and much more

Finally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare. By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional.

Who is the target audience?

Students who want to learn the basics of computer and cyber security
Students who want to become IT or Cyber Security Experts

Course Curriculum

General Introduction to IT & Cyber Security
Welcome to Cyber Security 00:15:00
Information Security vs Cyber Security 00:15:00
The Trinity of IT Security 00:15:00
Basic Terminologies 00:15:00
Computer Protocols 00:15:00
Cookies 00:15:00
TCP/IP 00:15:00
Mind of a Hacker
Mind of a Hacker 00:15:00
What is NOT Hacking 00:15:00
Types of Hackers 00:15:00
The Hacking Methodology 00:15:00
The WhoIS Query 00:15:00
Social Engineering 00:15:00
Attacks Intro 00:15:00
Brute Force Attacks 00:15:00
Phishing 00:15:00
Bots and Botnets 00:15:00
DoS and DDoS 00:15:00
Pings 00:15:00
Man in the Middle Attacks 00:15:00
SQL Injections 00:15:00
Introduction to Malware 00:15:00
Viruses & Worms 00:15:00
Trojans 00:15:00
Adware and Spyware 00:15:00
Ransomware 00:15:00
Other Types of Malware 00:15:00
Defences Intro 00:15:00
Anti-Virus 00:15:00
Encryption 00:15:00
Firewalls 00:15:00
Biometrics 00:15:00
Factor Authentication Methods 00:15:00
Honey Pots and DMZs 00:15:00
Security for Wireless Networks 00:15:00
Password Management 00:15:00
Information Security
A Sample BYOD Policy 00:15:00
A Sample BYOD Policy 00:15:00
Mobile Device Management 00:15:00
The Security Vs Ease of Access Paradox 00:15:00
The Weakest Link & The Disgruntled Employee 00:15:00
Cyber Warfare
Introduction to Cyberwarfare 00:15:00
The Attack Against Estonia 00:15:00
Stuxnet and the Attack Against Iran 00:15:00
The Sony Hack 00:15:00
Actionable Steps for Personal Security 00:15:00
Biggest Myths of Online Security 00:15:00
Conclusion 00:15:00
How We Are Tracked Online 00:15:00
Meet Eldo Kim 00:15:00

Course Reviews


  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

  • $100.00
  • 3 days
  • Course Badge
  • Course Certificate



    Template Design © eTraining.Online All rights reserved.