- Goals and Learning Objectives
- Protect What You Value
- What is Privacy, Anonymity and Pseudonymity
- Security, Vulnerabilities, Threats and Adversaries
- Asset Selection
- Threat Modeling and Risk Assessments
- Security vs Privacy vs Anonymity
- Confidentiality, Integrity and Availability
- Defense In Depth
- The Zero Trust Model
What you'll learn
- Learn How to Protect What The Value
- Difference Between Privacy,Anonymity and Pseudonomity
- How to Select Your asset
- Know Current Threat Model
- Zero Trust Model
Description
Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.
This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.
'An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.' - E. Wolfe
"Great intro to Cyber Security. I currently work in IT and I'm considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different conce
Other Courses
Life-changing laws
7 rules that will transform your life from good to a wonderful life.
FLOW EXERCISE FOR YOUR MIND & BODY
Ignite Your Spinal Engine with OctoRope and RopeFlow
Youtube Channel SEO & Video SEO
Learn the most updated SEO strategies when you setup your YouTube Channel SEO & Youtube video SEO
Baking Your Way To Business or Career 01 (Oatmeal Cookies)
Different Variations Of Best Selling Oatmeal Cookies - Mixing, Baking, Costing, Pricing, Recipe Modifier and more
About the instructors
- 3.21 Calificación
- 22970 Estudiantes
- 6 Cursos
Mr.Isaac Osei Asante
Cyber Expert , Hacker , Pentester and Film Maker Expert
Mr. Isaac Osei Well Known as Dr.Don Meccy or Famous Pentester is a Penetration Tester with over 7 years of experience in Ethical Hacking and Cyber Security. As a self made hacker that started from a young age he has learned it all from Ethical Hacking and Cyber Security to Online Privacy and How To Become Anonymous Online.
He has worked and discovered vulnerabilities for multiple companies and governments including Netflix,Melcom and Cazoo and Banks accross the world . He also worked as a freelancer that tested private web applications. He believes that Online Security and Privacy is something valuable but also that it doesn't get enough attention as many cyber attacks are being executed every single day! No System is Safe and that is why we are here to discover vulnerabilities and secure them before the bad guys attempt anything malicious.
His main goal as an instructor is to teach the foundations of Ethical Hacking and Cyber Security to anyone who wants to pursue this as a career or wants to learn it to protect themselves online. Cyber attacks and online security is something that changes really fast so we as hackers must always be ready to learn new things in order to better protect Networks, Websites, Machines .. and also people!
Apart from Security aspect . He has Passion in Film Making and Photography. He has Produced tow short films including short advert videos for schools .
Mr Isaac is a Jovial and Kind person to be with and he always welcome everyone into his space.
Student feedback
Course Rating
Reviews
informative
Very good.