Cybersecurity And Cyber Forensics
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.70 GB | Duration: 4h 51m
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.70 GB | Duration: 4h 51m
From Cyber Attacks to Digital Investigations—Made Easy for Everyone
What you'll learn
Learn the foundational principles of cybersecurity, including threat types, attack vectors, defense mechanisms, encryption, and network security protocols.
Gain the skills to recognize common cyber threats like phishing, malware, ransomware, and social engineering—and learn how to defend them
Understand the forensic process from evidence collection to analysis. Learn how to acquire, preserve, and analyze digital evidence.
Understand the legal frameworks, ethical considerations, and global policies related to cybersecurity and digital forensics, including data protection laws.
Requirements
No programming knowledge required.
Description
In today’s hyper-connected world, cyber threats are constantly evolving — from phishing attacks and malware to large-scale data breaches. This comprehensive course on Cybersecurity and Cyber Forensics is designed to help you understand how to protect digital systems and investigate incidents when things go wrong.Whether you're a student, a beginner in tech, or someone interested in digital safety, this course offers a solid foundation. You’ll explore the key types of cyber attacks, how they work, and the core principles of protecting information systems. From understanding network security and encryption to identifying vulnerabilities, you'll gain essential knowledge in cybersecurity.We also introduce you to the world of cyber forensics — the process of uncovering and analyzing digital evidence after a cyber incident. Learn how professionals trace the source of an attack, collect and preserve digital evidence, and understand the legal and procedural aspects involved in digital investigations.This course is designed to be beginner-friendly, with simplified explanations and real-world examples to make learning easy and practical. By the end, you’ll have a clear understanding of both defending digital systems and investigating cybercrimes.Step into the world of cybersecurity and cyber forensics — where digital protection meets digital investigation. Lets start the basics of cyber security
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Module 1
Lecture 2 Digital privacy
Lecture 3 OBA
Lecture 4 Online tracking
Lecture 5 Digital privacy laws
Lecture 6 Computer security risks
Lecture 7 Social engineering attacks and security solutions
Lecture 8 Firewall and passwords
Lecture 9 Secure online browsing
Lecture 10 Websites that create false identity and internet danger for kids
Lecture 11 Cloud storage security, IOT security and wearable IOT devices security
Section 3: Module 2
Lecture 12 How to Anonymize Everything You Do Online
Lecture 13 Anonymous network and TOR
Lecture 14 TOR browser
Lecture 15 I2P
Lecture 16 Freenet and darknet
Lecture 17 Anonymous OS and Tails
Lecture 18 Secure file sharing and VPN
Lecture 19 Proxy servers
Lecture 20 Connection leak testing
Lecture 21 Secure search engines
Lecture 22 Web browser privacy configuration
Lecture 23 Browser extension for privacy
Lecture 24 Anonymous payment method
Section 4: Module 3
Lecture 25 Encryption and cryptography
Lecture 26 Cryptography function and types
Lecture 27 Key exchange algorithms and digital signature
Lecture 28 Cryptographic system, trust model and selection criteria
Lecture 29 Cryptographic key pairs
Lecture 30 Bitlocker encryption
Lecture 31 Open source tool encryption and multitask encryption
Lecture 32 Secure cloud data, transit data and email communication
Lecture 33 Attacking cryptographic systems
Section 5: Module 4
Lecture 34 Cybercrime types and categories
Lecture 35 Unauthorized access and computer intrusions
Lecture 36 White collar crimes, viruses and malicious codes
Lecture 37 Internet hacking and cracking
Lecture 38 Virus attacks
Lecture 39 Pornography in Cybercrime
Lecture 40 Software piracy
Lecture 41 IP and mail bomb
Lecture 42 Exploitation and digital laws
Lecture 43 Cyber threats and cyber terrorism
Lecture 44 Online financial fraud
Lecture 45 Email tracking and recovery, IP tracking
Lecture 46 Search and seizure of computers and password cracking
Section 6: Module 5
Lecture 47 1. Introduction to digital forensics, Forensics hardware and software tools
Lecture 48 2. Analysis and Advanced Tools
Lecture 49 3. Forensic Technology and Practices, Forensics Ballistics and photography
Lecture 50 4. Face, Iris and Fingerprint recognition
Lecture 51 5. Audio and video analysis, windows and linux forensics
Lecture 52 6. Network and mobile forensics
Lecture 53 7. Cloud forensics
Beginners and Enthusiasts who want to start their journey into cybersecurity and digital forensics with no prior technical background required.