Cybersecurity Fundamentals

Tackle crimes of every nature, from financial to technical with your cybersecurity skills backed by our interactive Cybersecurity Fundamentals Course.

(CYBSEC-FUNDA.AW1) / ISBN : 978-1-64459-635-7
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Trace every step of the invisible criminals on the web with your strong cybersecurity skills. Learn Cybersecurity Fundamentals & win every war against cybercrime. 

Analyze and tap the algorithms of attacks and lead to a safe internet ecosystem with security. Build a strong digital infrastructure. 

Handle cyber threats with our hands-on training & get access to gamified assessments. Start your secure journey now!  

Skills You’ll Get

Understand Information security, World Wide Web Security, Network Security & Cybersecurity.  Learn about the various types of Intrusion Detection System Evaluate IP address and traceback mechanism Handle Sleepy Watermark Tracing (SWT) Develop a Timing-based stepping-stone detection approach Mitigate DDoS flooding attacks & DDoS attacks on OSI layers

1

Introduction

2

Introduction to Cybersecurity

  • Data and Information
  • Data Communication
  • Computer Network
  • World Wide Web
  • Internet
  • W3 Consortium (W3C)
  • Networking, W3, and Internet Relationship
  • Information Security
  • World Wide Web Security
  • Network Security
  • Cybersecurity
  • Information Security to Cybersecurity
  • Role of Risk Analysis in Cybersecurity
  • Conclusion
  • Points to Remember
  • Questions
3

Cybersecurity Landscape and Its Challenges

  • History of Computers and Cybercrime
  • Cybercrime: As a Profession
  • Cost of Cybercrime
  • Framework for Analysing the Cybercosts
  • Various Forms of Cybercrimes
  • Challenges in Cybersecurity
  • Cybercrime: As a Service
  • Cybercrime Underground Black Market
  • Conclusion
  • Points to Remember
  • Questions
4

Information Security and Intrusion Detection System

  • Critical National Infrastructure
  • Confidentiality-Integrity-Availability Triad
  • Defensive Lifecycle
  • Intrusion and Its Types
  • Intrusion Detection System
  • Characteristics of IDS
  • Major Types of Intrusion Detection Systems
  • Host-Based IDS versus Network-Based IDS
  • Intrusion Detection and Prevention Principles
  • Conclusion
  • Points to Remember
  • Questions
5

Cybercrime Source Identification Techniques

  • Cyber Forensic
  • Intrusion Activities
  • Attribution and Traceback
  • Why Attribution Is Difficult?
  • Assumptions in Traceback
  • IP Address and Traceback Mechanism
  • Classification of Traceback Schemes
  • Evaluation of IP Traceback Schemes
  • Active Response Characteristics
  • Sleepy Watermark Tracing (SWT)
  • Conclusion
  • Points to Remember
  • Questions
6

Stepping Stone Detection and Tracing System

  • The Problem of Accountability
  • Stepping Stones
  • Timing-Based Stepping Stone Detection Approach
  • Brute Force Content-Based Algorithm
  • Simple Content-Based Algorithm
  • Anomaly Detection Techniques
  • Conclusion
  • Points to Remember
  • Questions
7

Infrastructural Vulnerabilities and DDoS Flooding Attacks

  • COTS Software and Internet Security
  • Shortfalls in Internet Structure
  • Cooperative Intrusion Traceback and Response Architecture (CITRA)
  • DDoS Flooding Attacks
  • DDoS Attacks on OSI Layers
  • Cyberwar
  • Conclusion
  • Points to Remember
  • Questions

1

Introduction to Cybersecurity

  • Understanding Data, Information, and Data Communication
  • Understanding Cybersecurity Concepts
2

Cybersecurity Landscape and Its Challenges

  • Analyzing the WannaCry Ransomware Attack
  • Scanning and Classifying the Types of Viruses
  • Simulating a DDoS Attack
  • Performing a Phishing Attack
  • Confirming the Spoofing Attack in Wireshark
  • Defending Against a Buffer Overflow Attack
3

Information Security and Intrusion Detection System

  • Implementing an Intrusion Detection System
  • Understanding Intrusion Detection and Prevention
4

Cybercrime Source Identification Techniques

  • Understanding IP Addresses and Traceback Mechanisms
  • Understanding SWT
5

Stepping Stone Detection and Tracing System

  • Capturing and Analyzing Network Traffic with Wireshark
6

Infrastructural Vulnerabilities and DDoS Flooding Attacks

  • Conducting a DoS Attack Using a Smurf Attack
  • Generating and Analyzing a SYN Flood Attack Using a Packet Sniffer

Any questions?
Check out the FAQs

Want to Learn More?

Contact Us Now

Cybersecurity is a booming career, especially with the advent of AI & ML its scope has grown 10fold. Individuals can build exciting careers in this field & experience job security.

Yes, you can complete the Cybersecurity fundamentals course in 3 months however it depends upon your speed, experience & many other factors. It generally takes 6 months on average for individuals to complete the course.

CISSP (Certified Information Systems Security Professional) CEH (Certified Ethical Hacker) CompTIA Security+ CISM (Certified Information Security Manager) CCSP (Certified Cloud Security Professional) CISA (Certified Information Systems Auditor) CompTIA CySA+ (Cybersecurity Analyst)

Related Courses

All Courses
scroll to top