Skip to content
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
Course Catalog
About
Contact Us
Home
All Programs
Cybersecurity
Getting Started with Cybersecurity
Getting Started with Cybersecurity
Curriculum
3 Sections
24 Lessons
10 Weeks
Expand all sections
Collapse all sections
What Exactly Is Cybersecurity?
6
1.1
Cybersecurity Means Different Things to Different Folks
1.2
Quiz for Cybersecurity Means Different Things to Different Folks
5 Questions
1.3
Cybersecurity Is a Constantly Moving Target
1.4
Quiz for Cybersecurity Is a Constantly Moving Target
5 Questions
1.5
Looking at the Risks Cybersecurity Mitigates
1.6
Quiz for Looking at the Risks Cybersecurity Mitigates
5 Questions
Getting to Know Common Cyberattacks
24
2.1
Attacks That Inflict Damage
2.2
Quiz for Attacks That Inflict Damage
6 Questions
2.3
Is That Really You? Impersonation
2.4
Quiz for Is That Really You? Impersonation
7 Questions
2.5
Messing around with Other People’s Stuff: Tampering
2.6
Quiz for Messing around with Other People’s Stuff: Tampering
5 Questions
2.7
Captured in Transit: Interception
2.8
Quiz for Captured in Transit: Interception
6 Questions
2.9
Taking What Isn’t Theirs: Data Theft
2.10
Quiz for Taking What Isn’t Theirs: Data Theft
6 Questions
2.11
Cyberbombs That Sneak into Your Devices: Malware
2.12
Quiz for Cyberbombs That Sneak into Your Devices: Malware
8 Questions
2.13
Poisoned Web Service Attacks
2.14
Quiz for Poisoned Web Service Attacks
5 Questions
2.15
Network Infrastructure Poisoning
2.16
Quiz for Network Infrastructure Poisoning
5 Questions
2.17
Bogus and Faulty Updates
2.18
Quiz for Bogus and Faulty Updates
5 Questions
2.19
Malvertising
2.20
Quiz for Malvertising
5 Questions
2.21
Stealing Passwords
2.22
Quiz for Stealing Passwords
8 Questions
2.23
Exploiting Maintenance Difficulties
2.24
Quiz for Exploiting Maintenance Difficulties
5 Questions
The Bad Guys You Must Defend Against and How They Plan to Attack You
18
3.1
Advanced Attacks
3.2
Quiz for Advanced Attacks
6 Questions
3.3
Some Technical Attack Techniques
3.4
Quiz for Some Technical Attack Techniques
6 Questions
3.5
Bad Guys and Good Guys Are Relative Terms
3.6
Quiz for Bad Guys and Good Guys Are Relative Terms
5 Questions
3.7
Bad Guys Up to No Good
3.8
Quiz for Bad Guys Up to No Good
6 Questions
3.9
Cyberattackers and Their Colored Hats
3.10
Quiz for Cyberattackers and Their Colored Hats
6 Questions
3.11
Red Hats vs. Blue Hats
3.12
Quiz for Red Hats vs. Blue Hats
5 Questions
3.13
How Cybercriminals Monetize Their Actions
3.14
Quiz for How Cybercriminals Monetize Their Actions
5 Questions
3.15
Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
3.16
Quiz for Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
7 Questions
3.17
Defending against These Attackers
3.18
Quiz for Defending against These Attackers
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Your Journey Starts Here
Course Catalog
About
Contact Us
Login/Sign Up
Modal title
Main Content