If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
In this complete cyber security course you will learn everything you need in order to understand cyber security in depth. You will learn all the terminology related to cyber security. Which is very crucial in the field of IT security.
Join our community and stay up to date with computer science
********************
Join our FB Group: / cslesson
Like our FB Page: / cslesson
Website:
Table of Contents:
Why cyber Security (0:00)
Cyber Security Terminology (6:33)
Demystifying Computers (19:40)
Demystifying Internet (40:00)
Passwords and Hash Function (01:15:40)
Common Password Threat (01:30:30)
Creating strong password
How email works (02:14:22)
Email Security
Types of Malware (02:40:00)
Functions of Malware
Sources of Malware
Layers of defense against malware
How web browsing works
Safely navigating the web
Online Shopping
Wireless Network basics
Wireless internet security threats
Public wireless network
administering wireless network
Social media and privacy
Reading URLs…...more
In this complete cyber security course you will learn everything you need in order to understand cyber security in depth. You will learn all the terminology related to cyber security. Which is very crucial in the field of IT security.
Join our community and stay up to date with computer science
********************
Join our FB Group: / cslesson
Like our FB Page: / cslesson
Website:
Table of Contents:
Why cyber Security (0:00)
Cyber Security Terminology (6:33)
Demystifying Computers (19:40)
Demystifying Internet (40:00)
Passwords and Hash Function (01:15:40)
Common Password Threat (01:30:30)
Creating strong password
How email works (02:14:22)
Email Security
Types of Malware (02:40:00)
Functions of Malware
Sources of Malware
Layers of defense against malware
How web browsing works
Safely navigating the web
Online Shopping
Wireless Network basics
Wireless internet security threats
Public wireless network
administering wireless network
Social media and privacy
Reading URLs…...more