starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Introduction to Cybersecurity

Introduction to Cybersecurity

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena.

Ahmed Zekraoui
Ahmed Zekraoui
Cybersecurity | core | 1 hour 50 minutes |   Published: Apr 2021

    Discussions

Overview

2.3KSTUDENTS*
94.8%RECOMMEND*

This course includes:

  • 1+ hours of on-demand video
  • 3 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals

  • General overview about Cyber Security
  • Cybersecurity market size
  • Confusions: Cybersecurity or Cyber Security
  • Confusions: Cybersecurity vs information security
  • Cybersecurity professional roadmap
  • Top cybersecurity certifications by

Hacker’s techniques and motivations Understand hacker’s mindset

  • Hackers categories
  • What motivates hackers to hack
  • Understand the cybersecurity kill chain
  • Hacking techniques
  • Malicious software used by hackers
  • [LAB] How hackers generate malicious software
  • [LAB] How to detect that your machine is infected and how to protect yourself

Cybersecurity law and standards Laws and standards that you need to know

  • ISO27001
  • NIST Framework
  • PCI-DSS
  • Cybersecurity USA Laws
  • Cybersecurity EU Laws
  • Cybersecurity Australia Laws

Skills You Will Gain

Cybersecurity
Cybersecurity Tools
Hacker
Hacking Techniques
Standards

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Learn the basics of the cybersecurity field 
  • Learn the career opportunities in cybersecurity include top certification to boost your career 
  • Become familiar with the techniques and motivations of hackers 
  • Discover the different tools used by hackers 
  • Learn how to protect yourself from hackers 
  • Understand the Cybersecurity standards and the differences between them 

Prerequisites

  • Basic computer skills 
  • Basic knowledge of VirtualBox 
  • Admin rights may be required for software installation 
  • Laptop must have at least 4 GB free of RAM (for Kali Linux & Windows Virtual machines) 

Who Should Attend

  • Anyone interested in starting his/her career in cybersecurity 
  • Anyone interested in knowing much more about the cybersecurity field and its market size.
  • IT technicians: System engineers, Network engineers, DB Administrators, Software engineers, developers, …  
  • Security engineers who would like to increase their knowledge in standards and laws for example. 
  • Freelancers or other creative professionals.

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
Ahmed Zekraoui

Ahmed Zekraoui

Ahmed is a seasoned cybersecurity professional with a rich background in safeguarding complex IT environments. He holds a degree in Information Technologies from Université Libre de Tunis and has pursued advanced studies in Telecommunications at SUP'COM, equipping him with a strong foundation in both the technical and strategic aspects of cybersecurity. Ahmed's career spans various roles, including Data Center Engineer and System Administrator, where he developed expertise in incident response, Security Information and Event Management (SIEM), and endpoint protection. His dedication to advancing the cybersecurity field is evident through his continuous learning and professional certifications in Cloud Security, reflecting his commitment to staying ahead of emerging threats and technologies. Fluent in French, English, and Arabic, Ahmed excels in communicating complex security concepts across diverse teams and international environments. His instructional approach emphasizes real-world scenarios and practical knowledge, offering learners actionable insights and the skills necessary to succeed in today’s rapidly evolving cybersecurity landscape. With his technical acumen and hands-on experience, Ahmed is a valuable asset to any platform focused on cybersecurity education and innovation.
VIEW MY CHANNEL
1Welcome to the course!
2Module 1 - The Cybersecurity Field
3Module 2 - Hacker’s techniques and motivations
4Module 3 - Cybersecurity law and standards
5Quizzes

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 11 - Understand hacker’s mindset

Segment - 12 - Hackers Categories

Segment - 13 - IoT

Segment - 14 - What motivates hackers to hack?

Segment - 15 - Understand the cybersecurity kill chain - 01

Segment - 16 - Understand the cybersecurity kill chain - 02

Segment - 17 - Hacking techniques

Segment - 18 - Malicious software used by hackers

Segment - 19 - [LAB] How hackers generate malicious software?

Segment - 20 - [LAB] How to detect that your machine is infected and how to protect yourself?

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Quiz - Cybersecurity Path

Quiz - Cybersecurity Laws & Standards

Quiz - Hackers Techniques & Motivation

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

About the Course - Introduction to Cybersecurity

Instructor bio - Ahemd Zekraoui

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 01 - Introduction

Segment - 02 - General overview about Cyber Security

Segment - 03 - What Cybersecurity is?

Segment - 04 - Cyberstats

Segment - 05 - Cybersecurity market size

Segment - 06 - Confusions: Cybersecurity or Cyber Security

Segment - 07 - Confusions: Cybersecurity vs information security

Segment - 08 - Cybersecurity professional roadmap

Segment - 09 - Salary

Segment - 10 - Top cybersecurity certifications by

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment - 21 - Laws and standards that you need to know

Segment - 22 - ISO27001

Segment - 23 - NIST Framework

Segment - 24 - PCI-DSS

Segment - 25 - PCI-DSS Compliant

Segment - 26 - Laws Introduction

Segment - 27 - Cybersecurity USA, EU & Australia Laws

Segment - 28 - Last Power

Segment - 29 - Conclusion