Cyber Security Full Course for Beginner

In this complete cyber security course you will learn everything you need in order to understand cyber security in depth. You will learn all the terminology related to cyber security. Which is very crucial in the field of IT security.

Join our community and stay up to date with computer science
********************
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org
Table of Contents:
Why cyber Security (0:00)
Cyber Security Terminology (6:33)
Demystifying Computers (19:40)
Demystifying Internet (40:00)
Passwords and Hash Function (01:15:40)
Common Password Threat (01:30:30)
Creating strong password
How email works (02:14:22)
Email Security
Types of Malware (02:40:00)
Functions of Malware
Sources of Malware
Layers of defense against malware
How web browsing works
Safely navigating the web
Online Shopping
Wireless Network basics
Wireless internet security threats
Public wireless network
administering wireless network
Social media and privacy
Reading URLs

48 Comments

  1. SuperMartlno on March 14, 2020 at 5:10 pm

    where can i find lesson 1?

  2. God's Property on March 14, 2020 at 5:10 pm

    I have commented twice on 2 separate youtube videos in the almost 15 years I have been a member. I have been wanting to become a security professional and have been struggling to retain the wealth of information available everywhere. I was beginning to think that maybe I’m just not going to get it and I should pursue other ambitions. This video has been great. It is very well explained, perfectly presented and not dripping with monotoned condescension. I feel engaged and have not lost interest since I started it. Usually, by now my mind would begin to wander and I’d be considering what I should make for dinner or what I’d like the weekend to look like. I said all of that to say, thank you and I will continue to tune in.

  3. MrTheirlandais on March 14, 2020 at 5:11 pm

    change video speed to x1.5 to save time

  4. Patt Down on March 14, 2020 at 5:12 pm

    Thank you so much for this very clear and nice Tutorial
    thumbs up man 🙂

  5. ARUN RAJ on March 14, 2020 at 5:14 pm

    turn on the auto subtitles please

  6. My CS on March 14, 2020 at 5:15 pm

    Learn more about cybersecurity practically:
    Practical cybersecurity: Network security: https://youtu.be/qvDg17PbSnU

  7. Pure Dirt on March 14, 2020 at 5:20 pm

    1:07:00

  8. Godwin David on March 14, 2020 at 5:20 pm

    thanks for this lecture!

  9. Kayleigh Welch on March 14, 2020 at 5:21 pm

    Do not take risks and do not trust the unverified! Join Utopia Ecosystem

  10. Harry Hilton 1974 on March 14, 2020 at 5:23 pm

    I am looking to go online and study cybersecurity and this will be a great help thank you so much

  11. ArkaDianos on March 14, 2020 at 5:24 pm

    This course will help me learn and find a job in this domain?

  12. Real Pope on March 14, 2020 at 5:24 pm

    This guy is amazing….He makes things appear so easy even without IT knowledge

  13. abbey macfarlane on March 14, 2020 at 5:25 pm

    Great video. Helped me so much with my cyber security certificate exam and inspired me to start computing at university! Thanks for the info!

  14. Nicolas Mayo on March 14, 2020 at 5:25 pm

    35:28 wow, Internet Explorer was not even mentioned… RIP

  15. Mike Mar on March 14, 2020 at 5:27 pm

    You have so much insights of teaching , I would say best online teacher in the world.

  16. Complexeon on March 14, 2020 at 5:28 pm

    Wow. There is a person in IT who has pleasant presenting skills? Thanks man <3

  17. Easy Concept. on March 14, 2020 at 5:29 pm

    Sir Salut you
    Loot of love from Pakistan…

  18. yoshi tink on March 14, 2020 at 5:31 pm

    ❤️

  19. Ach Eva on March 14, 2020 at 5:35 pm

    What’s the meaning of HTML?

  20. Felix Johns on March 14, 2020 at 5:36 pm

    Utopia is a new technology that will be launched in 2019, however you may test it, and whats most important is that you can even participate in its development and promotion, right now. There are countless ways in which you can contribute to the future of P2P technology that changes the world.

  21. Bismark Asare on March 14, 2020 at 5:36 pm

    This is an amazing lecture and it never got boring . Thank you!

  22. PAPA CHOUDHARY on March 14, 2020 at 5:38 pm

    Thanks

  23. ilmarinen79 on March 14, 2020 at 5:39 pm

    I have a hard time understanding the following concept: giving up your passwords to a random ‘password manager service’ is safe and wise. I don’t know how knowing it’s a massive internet company makes it any better either. Sounds pretty much equal to any phone caller saying they are cool & nice and can keep your password safe. Do you have some magical access to the actual data flow what is going on behind the interface text or guarantees more reliable than saying company X says they aren’t evil? Selling people’s data to 3rd parties is pretty much the core business item these days but I’m sure it cannot happen with giving up your passwords to a shiny UI object…"Experts have widely agreed…" = Yeah whatever, the wind is blowing etc. Please help me understand this glitch in the matrix.

  24. Suresh yadav Suresh yadav on March 14, 2020 at 5:39 pm

    Video from information technology bachelor

  25. see you in the dark side of the moon on March 14, 2020 at 5:41 pm

    This tutorial is amazing,thank you so much.

  26. Basics 029 on March 14, 2020 at 5:42 pm

    One last video before sleeping. <3

  27. aldemar on March 14, 2020 at 5:43 pm

    Why is the end cut off?

  28. IS Decisions on March 14, 2020 at 5:44 pm

    Those are nice videos!

  29. Isaiah Rouse on March 14, 2020 at 5:44 pm

    Great information explained very nicely

  30. KWRER on March 14, 2020 at 5:46 pm

    Why Cyber Insurance Is Worth The Investment , Read more on Global Banking & Finance Review. https://www.globalbankingandfinance.com/why-cyber-insurance-is-worth-the-investment/ #cybersecurity #investment

  31. Patricia Murphy on March 14, 2020 at 5:49 pm

    You mentioned a book; what is the name of the book?

  32. Henry Awere on March 14, 2020 at 5:50 pm

    Thank you for investing your time and effort. Really useful.

  33. Joseph Inge on March 14, 2020 at 5:53 pm
  34. Will Toler on March 14, 2020 at 5:53 pm

    this course is helpful but the fucking sniffing shit gotta stop dude

  35. TechnoVan on March 14, 2020 at 5:54 pm

    omfg since start the video 45 minutes later and he still did not even talk about security yet ! video like this make you give to learn something in the first place i just lost interesting for !

  36. Jeremy Poole on March 14, 2020 at 5:55 pm

    Nowadays, it is very important to protect your data. I recently learned about Utopia I think this is a very interesting project for anonymity on the Internet and data security

  37. Faarid Irfan on March 14, 2020 at 5:57 pm

    I am 51 have become so disappointed about searching job in administration and secretarial field etc., now after failed to get job in same field want to change my career also to escape from stress of continue finding job, and want to be certified cyber security professional in my 51 years of age to be live life in my own happy way

  38. Steve Davey on March 14, 2020 at 5:58 pm

    21:00 – Stuxnet actually contained *multiple* zero-day exploits, each reckoned to be worth in the region of £100,000 in the Cyber Security black market.

  39. Joel Rice on March 14, 2020 at 5:58 pm

    what are good books or apps to learn more about cybersecurity

  40. Sayma Faarid on March 14, 2020 at 6:04 pm

    Although my English not so good but catching explanations fast good

  41. Patrick Longman on March 14, 2020 at 6:05 pm

    For beginners, I can advise you to use a VPN, tor and Utopia, and you can not worry about your data and personal correspondence

  42. E Washo on March 14, 2020 at 6:05 pm

    Really helpful thank you mate. Im starting a 3 year degree at University on CS this September but I am coming from a working background (I never went to college) so I have a lot of catching up to do!

  43. Agyeman Offei on March 14, 2020 at 6:05 pm

    It keeps getting interesting

  44. rohit ks on March 14, 2020 at 6:06 pm

    cyber-cops.com
    We are a group of professionals – cyber experts, IPS officers, lawyers, forensic experts, IITians and other technical experts. We have come together, guided by vision and visionaries, under this platform to provide one stop solution to all your virtual world needs – Defensive as well as Offensive – by providing a credible and reliable source of information.

    We help individuals secure their networks and devices, provide an online forum for Q&A, crowd source the information on cyber-criminal MOs, list the best tools and techniques used globally, compare the various online gadgets for users to make a more informed choice, help plug in the various cyber-security loopholes, offer SOPs to victims of cyber-crime, provide practice questions to sharpen cyber skills and more …..

  45. DarienDragonFox on March 14, 2020 at 6:06 pm

    I’m a security hazard D^:

  46. Said Ibrahim on March 14, 2020 at 6:06 pm

    Where is other parts of this course ?

  47. Amajama Joseph on March 14, 2020 at 6:07 pm

    Decrypting hash passwords could also be done using cypher as i read in most Ethical Hacking Books, so even hash password are merely hard to black hats. Good lesson from you bro,i like the guide beginner,

Leave a Comment