Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:04,590 --> 00:00:10,440
Welcome to the most fun and engaging course on cyber security that you will ever embark upon.
2
00:00:10,770 --> 00:00:17,520
Hello, my name is Dr. Usman and with a PhD in computer networks and over a decade of experience in
3
00:00:17,520 --> 00:00:21,400
the cyber security and software industry, I'm here to guide you.
4
00:00:21,420 --> 00:00:26,490
I am CISSP Certified, which is the premium certification in cyber security.
5
00:00:26,490 --> 00:00:32,910
And to date, I've taught over more than 100,000 students in person and online across different continents,
6
00:00:32,910 --> 00:00:35,280
from Europe to Middle East to Australia.
7
00:00:35,580 --> 00:00:40,600
I've also had the honor of delivering keynote speeches at several reputed venues across the world.
8
00:00:40,620 --> 00:00:43,920
I'm so excited and thrilled to be your mentor in this course.
9
00:00:48,270 --> 00:00:54,630
One of the nice things about this course is that I have extensively used animations to explain complex
10
00:00:54,630 --> 00:00:56,130
cybersecurity concepts.
11
00:00:56,130 --> 00:01:01,740
So whatever topic we are discussing, we're going to supplement that with very interactive and interesting
12
00:01:01,740 --> 00:01:07,650
and engaging animations so that by the end of that lecture you will have a crystal clear idea of what
13
00:01:07,650 --> 00:01:09,150
the actual concept was.
14
00:01:09,360 --> 00:01:13,920
Now, for example, if we are discussing hashing, we're going to walk you step by step right from the
15
00:01:13,920 --> 00:01:19,650
start to the end so that you have an absolutely crystal clear idea of what the concept is.
16
00:01:19,650 --> 00:01:25,530
Using animations to explain these concepts makes it very easy for absolute beginners to understand.
17
00:01:26,530 --> 00:01:31,120
Six practical hands on labs are going to ensure that you have practical skills.
18
00:01:31,120 --> 00:01:36,400
So, for example, in the investigate fishing lab, you're going to vet emails and do a forensic analysis
19
00:01:36,400 --> 00:01:39,530
to identify whether an email or attachments are malicious or not.
20
00:01:39,600 --> 00:01:41,950
The practical skills that you can list on your resume.
21
00:01:42,100 --> 00:01:47,890
You're going to do port scanning of an active web server to identify vulnerable applications as well
22
00:01:47,890 --> 00:01:49,000
as open ports.
23
00:01:49,030 --> 00:01:55,450
This would help you assess the security of your web server, as well as identify open ports or services
24
00:01:55,450 --> 00:01:59,890
that need to be mitigated in order to increase the security posture of your web server.
25
00:02:01,120 --> 00:02:03,580
In order to ensure a solid learning experience.
26
00:02:03,580 --> 00:02:08,860
At the end of every module, there is a quiz to confirm that you have learnt the concepts properly.
27
00:02:10,060 --> 00:02:14,800
Check out the five star ratings left by thousands of happy students for this course.
28
00:02:29,110 --> 00:02:31,990
And please don't forget to leave a rating for the course.
29
00:02:32,890 --> 00:02:37,690
This course assumes no prior programming experience, and you can take this course even if you are an
30
00:02:37,690 --> 00:02:39,670
absolute beginner in cybersecurity.
31
00:02:39,820 --> 00:02:45,460
Every concept in this course is explained as if for an absolute beginner, someone with no prior experience
32
00:02:45,460 --> 00:02:46,660
of cybersecurity.
33
00:02:46,840 --> 00:02:52,270
So this is how I'm going to help you build your foundation step by step so that by the end of the course
34
00:02:52,270 --> 00:02:55,360
you are an expert in the core cybersecurity domains.
35
00:03:00,630 --> 00:03:05,790
Another interesting thing about this course is that I've tried to condense more than 14 hours of content
36
00:03:05,790 --> 00:03:07,320
into nearly seven hours.
37
00:03:07,350 --> 00:03:10,740
This is to respect your time and effort as you're going to see.
38
00:03:10,770 --> 00:03:16,650
We do not have a lot of fluff in this course, and I'll directly attack the core concepts of cybersecurity,
39
00:03:16,650 --> 00:03:22,380
and we're going to be very precise and focused with nearly seven hours of fun and engaging content,
40
00:03:22,380 --> 00:03:25,620
six hands on labs, quizzes and much more.
41
00:03:25,710 --> 00:03:28,740
You'll be ready to jump start your cybersecurity career.
42
00:03:28,740 --> 00:03:30,120
So what are you waiting for?
43
00:03:30,150 --> 00:03:34,980
Embark on your learning journey today and join the ranks of thousands of students who have fallen in
44
00:03:34,980 --> 00:03:36,210
love with this course.
45
00:03:36,810 --> 00:03:40,170
Unlock a world of opportunities in the cybersecurity world.
5028
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.