Introduction to Cybersecurity

Course Feature
  • Cost
    Free
  • Provider
    Udacity
  • Certificate
    No Information
  • Language
    English
  • Start Date
    Self Paced
  • Learners
    No Information
  • Duration
    No Information
  • Instructor
    /
Next Course
2.0
0 Ratings
Explore the essentials of Introduction to Cybersecurity
Show All
Course Overview

❗The content presented here is sourced directly from Udacity platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.

Updated in [July 13th, 2023]

This course will teach you the fundamentals of social engineering from scratch. You will learn the basics of social engineering, including the different types of social engineering attacks, how to identify and prevent them, and how to use social engineering techniques to protect yourself and your organization. You will also learn how to use social engineering to gain access to sensitive information, and how to use it to your advantage. Finally, you will learn how to use social engineering to influence people and gain their trust.

Show All
Recommended Courses
free cyber-security-the-ultimate-beginner-handbook-4805
Cyber Security: The Ultimate Beginner& Handbook
3.0
Udemy 8,200 learners
Learn More
Discover the fundamentals of Cyber Security: The Ultimate Beginner& Handbook
free improve-cybersecurity-skills-with-ctfs-picoctf-walkthrough-2018-4806
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
2.0
Youtube 0 learners
Learn More
Discover the fundamentals of Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
free stanford-seminar-how-not-to-generate-random-numbers-4807
Stanford Seminar - How Not to Generate Random Numbers
5.0
Youtube 20 learners
Learn More
Explore the essentials of Stanford Seminar - How Not to Generate Random Numbers
free software-security-4808
Software Security
3.0
Coursera 0 learners
Learn More
This course explores the fundamentals of software security. We'll examine common software vulnerabilities and attacks, such as buffer overflows, SQL injection, and session hijacking, and learn how to defend against them with advanced testing and program analysis techniques. We'll also take a "build security in" approach, looking at ways to strengthen software systems at each stage of the development cycle. To get the most out of this course, learners should have completed sophomore/junior-level undergraduate work in a technical field, have some programming experience, preferably in C/C++ and another "managed" language (like ML or Java), and have prior exposure to algorithms. Those without these skills can brush up with online tutorials.
Favorites (0)
Favorites
0 favorite option

You have no favorites

Name delet