Cybersecurity 101 Curriculum
- 04.01 Module Introduction (1:41)
- 04.02 Cyber Kill Chain (16:07)
- 04.03 Social Engineering (12:08)
- 04.04 Phishing (7:16)
- 04.05 Exploitation (12:43)
- 04.06 Persistence (13:26)
- 04.07 Privilege Escalation and Lateral Movement (20:41)
- 04.08 Actions on Objective (10:26)
- 04.09 Lab - Using Nmap for network and system reconnaissance (30:19)
- 04.10 Knowledge Assessment
- 04.11 Additional Digging
- 08.01 Module Introduction (2:32)
- 08.02 What and Why is Defender Tech/Ops? (17:04)
- 08.03 Firewalls (17:05)
- 08.04 Endpoint Detection and Response EDR (20:46)
- 08.05 Mobile Device Management MDM (13:26)
- 08.06 Email Security Gateway (22:25)
- 08.07 Attack Emulation (21:03)
- 08.08 Security Incident and Event Management (SIEM) (20:55)
- 08.09 Lab - Configuring a Firewall (18:30)
- 08.10 Knowledge Assessment
- 08.11 Additional Digging
- 09.01 Module Introduction (2:08)
- 09.02 What is Espionage? (16:31)
- 09.03 Tools for Espionage (15:18)
- 09.04 Government and Corporate Espionage Case Studies (12:59)
- 09.05 Defending From Espionage (10:06)
- 09.06 Lab - Hiding Data in Pictures with Stegnography (22:13)
- 09.07 Knowledge Assessment
- 09.08 Additional Digging
- 12.01 Module Introduction (3:04)
- 12.02 What Is Vulnerability Management and Why Should You Care (21:59)
- 12.03 How Vulnerabilities are Discovered (17:28)
- 12.04 Bug Bounty Platforms and Responsible Disclosure (20:17)
- 12.05 Security Vulnerabilities and Patching (18:41)
- 12.06 Why Is Vulnerability Management Hard (12:06)
- 12.07 Lab - Vulnerability Scanning a System (17:33)
- 12.08 Knowledge Assessment
- 12.09 Additional Digging
- 13.01 Module Introduction (4:05)
- 13.02 What Is Cyber Warfare and Why Should You Care (10:51)
- 13.03 History of Cyber Warfare (22:53)
- 13.04 Advanced Persistent Threats (APT) (13:33)
- 13.05 Russian Ukrainian Conflict Cyber War Case Study (20:19)
- 13.06 Lab - Brute Forcing Access with Hydra (46:13)
- 13.07 Knowledge Assessment
- 13.08 Additional Digging
Who is Dr. Gerald Auger?
Dr. Auger is a 20+ year cybersecurity professional, academic, and published author. He is a leading cybersecurity expert at MUSC, an esteemed academic medical center with a multi-billion dollar scope.Â
He has established comprehensive cybersecurity programs, teaches in The Citadel Military College's Cyber Sciences department, and is the Chief Content Creator for the well-known YouTube channel Simply Cyber.Â
Passionate about his field, Dr. Auger has educated thousands of students and holds a PhD in Cyber Operations along with two Master's degrees in Computer Science and Information Assurance.
Connect with him at https://SimplyCyber.io/socials
Transparency Statement
This course is awesome and I poured a lot of thought, effort, and knowledge into it, but there are limitations I want to make sure you know before deciding if its right for you.
- Course access is 6 months from purchase. This course is designed to be completed in 3 months. Plenty of time to complete, but don't sign up if you think you can't do it in 6.
- Lab environment allows 60 minutes of access a day. Any lab can be completed in less than 60 minutes, so this is only an issue if you are trying to do multiple labs and you run out of time for the day.
- Completing the course will issue you a certificate of completion and 22 CEU's.