Cyber Security Basics
Cyber Security
IT and Software ,Network and Security,Cyber Security
Lectures -27
Duration -1.5 hours
Lifetime Access

Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Data, device, and information security are becoming increasingly important these days, not only for organisations but also for individuals who need to protect their data against cyber-related attacks.
The course, Cyber Security, focuses on learning the skills and simple (and also complex) tips that immediately help you protect your personal, sensitive, and private information, data, and devices from cyber-related attacks or other forms of attacks on your personal data or organisation.
Understanding these skills and tips does not require great expertise skills except in complex situations where you can simply use the expertise of the professional, so you can start immediately with ideas learned in this course.
The course applies to people on all levels.
Course Modules / Structure
The Course is divided into 4 Modules:
- Module 1: Introduction to CyberSecurity
- Module 2: Personal and Organisational Data and Vulnerability
- Module 3: The Cyber Security Framework
- Module 4: Dealing with Cyber Attacks - Tips
CASE STUDY – Using a Fictional Person/Name like Dominic
- Dominic works at a start-up company where they are currently facing some cyber-related attacks daily
- Dominic also notices that his data on his company laptop may be endangered
- Dominic also realises that the company is slow to respond to these attacks, and he would like to take some personal steps/actions himself to help both his personal data and company information
- Dominic will also want to apply these cyber-attack-preventive skills on his laptop
CASE STUDY ANALYSIS:
- In the case above, what do you think Dominic should consider doing?
NOTE: Your Review is Highly Valued
We value your feedback. Please leave us a review after finishing the course; it will always be appreciated for future improvements.
Goals
Definitions of Cyber Security
Importance and Applications of Cyber Security
Types of Cyber Attacks
Personal and Organisational Data and Vulnerability
Vulnerabilities, Malware and Ransomware
The Cyber Security Framework – Identify, Protect, Detect, Respond, Recover
Tips Dealing with Cyber Attacks - Data and Devices, Wireless Network, Ransomware, Phishing, Spoofing, etc.
Prerequisites
- Making time to put the course skills into practice
Curriculum
Check out the detailed breakdown of what’s inside the course
General Introduction and Course Introduction
1 Lectures
-
Course-Introduction 04:38 04:38
Introduction to Cyber Security
4 Lectures
Personal and Organizational Data and Vulnerability
4 Lectures
The Cyber Security Framework
7 Lectures
Dealing with Cyber Attacks - Tips
10 Lectures
Course Summary - Cyber Security Basics
1 Lectures
Instructor Details
Fredrick Ezeh
Also involved in team development and personality awareness coaching as well as integration projects.
Promoter of new ideas and discoveries especially Pan-African related discoveries.
You can also contact me for:
- Project Planning using Microsoft Excel and Microsoft Project and other tools
- Soft skills and leadership mentoring
- Managing for non-managers
- Influencing without power
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now