Course Details

Cyber Security Course

Teacher Ahmed Samir
Price $$ EGP

Course Description :

Welcome to our comprehensive Cybersecurity course! This engaging course is designed to equip you with the essential knowledge and skills to protect systems and networks from cyber threats. You'll start with an introduction to cybersecurity, learning about its core concepts and the various types of cyber threats that exist today.

Course Outline :

  • Introduction to Cybersecurity
    • Understanding Cybersecurity
    • Core Cybersecurity Concepts
    • Common & Types of Cyber Threats
    • Types of Hackers
    • Cybersecurity Best Practices
  • Cryptography
    • Encoding
    • Decoding
    • Hashing
  • Linux
    • Log into a Linux system and run simple commands
    • Copy, move, create, delete, and organize files
    • Create, manage, and delete local users and groups
    • Set Linux file system permissions on files
    • Evaluate and control processes
    • Piping
  • Network
    • OSI Model
    • Network Topologies
    • Network Protocols
    • Routing
  • Programming [Python]
    • Variable Types
    • Basic Operators
    • Decision Making
    • Loops
    • Strings
    • Lists
    • Functions
  • Pentration Testing
    • Web Technologies
    • Information Gathering
    • Vulnerability Assessment
    • Web Application Attacks
    • Solve CTFs

What Will I Learn? :

  • Understanding cybersecurity and its importance
  • Fundamental concepts of cryptography
  • Basic Linux commands and file management
  • Networking fundamentals and protocols
  • Python programming basics
  • Pentration testing techniques and tools
Understanding Cybersecurity
Core Cybersecurity Concepts
Common & Types of Cyber Threats
Types of Hackers
Cybersecurity Best Practices
Encoding
Hashing
Log into a Linux system and run simple commands
Copy, move, create, delete, and organize files
Create, manage, and delete local users and groups
Set Linux file system permissions on files
Evaluate and control processes
Piping
OSI Model
Network Topologies
Network Protocols
Routing
Variables Types
Basic Operators
Decision Making
Loops
Strings
Lists
Functions
Web Technologies
Information Gathering
Vulnerability Assessment
Web Application Attacks
Solve CTFs

Scroll to top