Premium Only Content

Cyber Security Training for Beginners - Full Course
In this Computer security course, we'll learn everything about Cyber Security. Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
This cybersecurity course is for beginners who would like to kickstart their cyber security career.
1 - Avoiding Plagiarism
A brief introduction to plagiarism. This video gives some tips for avoiding plagiarism of ideas and language.
2 - Why Study Cyber Security
Sketches some reasons why everyday people would want to study cyber security.
3 - Cyber Security Terminology
Presents new vocabulary terms in context with true stories about cyber attacks.
4 - Demystifying Computers
Identifies the basic parts of a computer in plain English. Describes four layers of a computer system: Users, Hardware, Operating System, Applications
Describes what happens when users turn on a computer and when they run an application.
5 - Demystifying the Internet
Introduces some helpful concepts for understanding the Internet.
Describes the basic structure of the whole Internet. Also describes the basic structure of small, individual networks like home wireless networks or office networks.
Describes how information is routed across the Internet.
6 - Passwords and Hash Functions
Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.
7 - Common Password Threats
8 - Creating Strong Passwords
Provides tips for creating strong, memorable passwords.
9 - Managing Passwords
Provides tips for managing passwords
10 - How Email Works
Describes the paths that emails follow across the Internet.
11 - Email Security
Discusses six common email threats: Eavesdropping, Spamming and Phishing, Spoofing, Malicious Email Attachments, Replying and Forwarding Issues, Carbon Copy (CC) and Blind Carbon Copy (BCC) Issues
12 - Varieties of Malware
Introduces four different kinds of malware: Viruses, Worms, Trojan Horses, Bots
13 - Functions of Malware
Describes seven common functions of malware
14 - Sources of Malware
Describes eight common sources of malware
15 - Layers of Defense Against Malware
Describes five layers of defense against malware
16 - How Web Browsing works
An introduction explaining how computers interact with the web.
17 - Safely Navigating the Web
Discusses four web safety issues
18 - Online Shopping
Addresses eleven security issues for online shopping
19 - Wireless Network Basics
Provides a few brief notes on how wireless networks work.
20 - Wireless Internet Security Threats
Notice: We recommend that an adult screen this video before sharing it with young children. The fourth section of this video contains a passing reference to a serious and potentially frightening cyber crime.
21 - Using Public Wireless Networks
Shares five tips for safer browsing on public WiFi
22 - Administering Wireless Networks
Covers six tips for administering a home wireless network
23 - Social Media and Privacy
Addresses three privacy considerations for social media users
24 - Describes two security issues for users of social media: Burglars on Social Media, Phishing Scams and Malware on Social Media
25 - Social Engineering
Describes four common social engineering threats
26 - Reading URLs
Being able to read URLs helps web users to verify that they are visiting authentic web pages instead of malicious counterfeits.
27 - Interpersonal Issues Online
Describes five common interpersonal issues that web users should be aware of:
1. Anonymity
2. Missing the Communication Context
3. Privacy
4. Everlasting Information
5. Credibility
#CyberSecurity #Security #Morioh
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
Original video by IowaCyber
-
1:26:16
JULIE GREEN MINISTRIES
3 hours agoLIVE WITH JULIE
114K220 -
LIVE
The Pete Santilli Show
3 hours agoOur Memorial & Prayer Vigil For Charlie Kirk - September 15, 2025
504 watching -
Welcome to the Rebellion Podcast
23 hours ago $1.75 earnedWhere Do We Go From Here? - WTTR Podcast Live 9/15
29K1 -
1:58:52
The Chris Salcedo Show
18 hours ago $3.77 earnedFALLOUT: Charlie Kirk's Assassination
29.3K9 -
4:04:01
The Bubba Army
3 days agoCharlie Kirk's Shooter, Had a Trans BF? - Bubba the Love Sponge® Show | 9/15/25
53.2K16 -
30:31
DeVory Darkins
16 hours ago $9.71 earnedCNN forced to admit the shocking truth about shooter as Fetterman drops bomb on Democrats
35.9K86 -
20:54
Professor Nez
18 hours ago🚨BREAKING: Shooter’s Own Words in Charlie Kirk Case Revealed
18.9K17 -
16:48
itsSeanDaniel
18 hours agoGenius Republican Defends Charlie Kirk and CALLS OUT The Radical Left
15.8K4 -
9:09
Freedom Frontline
18 hours agoFox News Just Showed The Video Biden Never Wanted Seen
23.8K26 -
0:27
historyofboxing
19 hours ago $0.66 earnedThe Cuban Machine… and Deadliest KO Phenom Right Now – David Morrell Jr
12.2K1