Cyber Security 101

About Cyber Security 101:
In this course, we will learn about the Internet and data, also we will talk about different types of cyber attacks and how to prevent them.

3 Session, 26 Lessons


By purchasing this course, you will have 3 months of access to the videos.


    Session 1: The Internet

  • Cyber Security refers to the tools, techniques and practices that protect electronics devices from any Cyber-attack that aims to steal, change or manipulate private data. In this lesson, participants will be introduced to the concept of Cyber Security, its applications and benefits is protecting their data privacy.

  • This lesson introduces the participants to the conceptual explanation about the internet and how it works, which is defined as interconnected communication networks that allow data transfer between electronics devices. This video also explains the need for IP addressing.

  • This Lesson explains the difference between IPv4 and IPv6, and the purpose of the internet protocol as a set of rules to ensure successful communication between devices. It also explains the functionality of the TCP/IP protocol and the OSI model.

  • DNS

    This Lesson introduces participants to the purpose of the DNS server on the internet, and its data base. It also explains how to access web pages through the web browser using the URL.

  • In this lesson, the participants will learn about the functionality of the internet routers and how they can route the data packets between different networks. It also introduces the concept of path redundancy on the internet and routing options.

  • This lesson will teach the participants about the security measures related to the router device, including changing the SSID, the default IP address, the security standards (WPA2, WPA3) as well as changing their network password to ensure high level of security.

    Session 2: Cyber Attacks

  • Computer viruses are malicious computer programs written in a programming language and designed to attack your computer and effect its operations. In this lesson, Participants will learn about the concept of computer viruses, how they get downloaded on their devices and how to protect their computing devices from any computer virus.

  • This videos introduces participants to a Cyber-attack called DDoS, and the concept of Bot Net which aims to overwhelm servers with many fake requests causing it to overload.

  • The participants will learn about a cyber-attack called Keylogging, were attackers store the keystrokes on a hardware flash drive or through software. They will also learn how to protect their computers from such a potential attack.

  • This lesson presents two cyber-attacks called Phishing and Pharming, were attackers steal sensitive information by directing you to a fake website requesting a fake verification of your account details.

  • In this lesson, participants will learn about the need for data base and SQL language for data manipulation. They will also be introduced to a Cyber-attack called SQL injection and how it is perfomed, detected and prevented.

  • This lesson presents the concept of Cross Site Scripting attack. In which attackers use it to steal users’ private information on a specific website. Participants will learn how this could be executed on a website and how they can protect their devices and information from such an attack.

  • This lesson presents two cyber-attacks known as adware & ransomware. Adware is a malware that throws advertisement within the web browser. Ransomware is an attack that prevents people from accessing a specific file or their computer systems unless they pay a ransom. This lesson also covers the techniques used to stop such attacks.

  • This lesson introduces participants to a cyber-attack knows as DNS spoofing, were an attacker redirect traffic to a fake website by changing the associated IP address for a specific website in the DNS server. They will also learn about the tools used to prevent such attack from happening.

  • Participants will be introduced to another spoofing attack called IP spoofing, in which the attacker uses a fake source IP address for the packets to route the traffic to the victim IP destination in an effort to impersonate their computing devices. This lesson also introduces the IPsec protocol as a solutions to prevent IP spoofing.

    Session 3: Secuirty Measures

  • Participants will learn about website cookies, which is a document that contains data about the user preferences such as website language, layout and more, and is stored on the computer. They will also learn about the Identifier purpose for each cookie.

  • Participants will learn about Firewall Security and how it works as a security barrier between Private and public networks. Two types of firewalls will be introduced in this lesson, Host-based Firewall and network-based firewall.

  • HTTPS is an essential protocol to ensure a secure transfer of webpages between the webserver and the browser. In this lesson, the participants will learn how HTTPS, SSL, TLS protocols work to ensure that a website is a trustworthy website. They will also learn about the format of the http request and response.

  • VPN

    This lesson introduces the concept of VPN as a security tool, to protect your privacy and data on the internet. Participants will learn how VPN works, the purpose of it and how they can use it to protect them from any cyber-attack.

  • This lesson introduces the concept of Caesar Cipher, as one of the oldest encryption techniques, in which you shift the alphabet a specific number of letter to encrypt the messages. Participants will also learn how to perform this type of encryption and its security concerns.

  • Participants will learn about Vigenere Cipher as an encryption technique, and how it is used to encrypt messages using a Cipher key and the vigenere matrix.

  • After learning how to encrypt messages using the Vigenere Cipher in the previous lesson. Participants will learn, in this lesson, how to decrypt any Cipher Text using the Vigenere Cipher Technique and Key. They will also learn about the concept of Symmetric Encryption.

  • In this lesson, Participants will learn the concept of Asymmetric Encryption and how it differs from Symmetric Encryption. They will also learn how Public Key Encryption is performed to send encrypted messages using Public and Private Key’s generator.

  • In this lesson, Participants will understand the need for another layer of protection for their personal information, and get familiar with the concept of Two-factor authentication that aims to secure your personal accounts against any cyber-attack.

  • This is a summary lesson, where we highlight all the concepts and topics we covered throughout the course, under three main sessions (The internet, Cyber-Crimes, Security Measures)