starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Introduction to Cybersecurity

Introduction to Cybersecurity

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena.

Ahmed Zekraoui
Ahmed Zekraoui
Cybersecurity | core | 1 hour 50 minutes |   Published: Apr 2021
In partnership with:  Coursera

    Discussions

Overview

2.3KSTUDENTS*
94.8%RECOMMEND*

This course includes:

  • 1+ hours of on-demand video
  • 3 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals

  • General overview about Cyber Security
  • Cybersecurity market size
  • Confusions: Cybersecurity or Cyber Security
  • Confusions: Cybersecurity vs information security
  • Cybersecurity professional roadmap
  • Top cybersecurity certifications by

Hacker’s techniques and motivations Understand hacker’s mindset

  • Hackers categories
  • What motivates hackers to hack
  • Understand the cybersecurity kill chain
  • Hacking techniques
  • Malicious software used by hackers
  • [LAB] How hackers generate malicious software
  • [LAB] How to detect that your machine is infected and how to protect yourself

Cybersecurity law and standards Laws and standards that you need to know

  • ISO27001
  • NIST Framework
  • PCI-DSS
  • Cybersecurity USA Laws
  • Cybersecurity EU Laws
  • Cybersecurity Australia Laws

Skills You Will Gain

Cybersecurity
Cybersecurity Tools
Hacker
Hacking Techniques
Standards

Learning Outcomes (At the end of this program you will be able to)

  • Learn the basics of the cybersecurity field 
  • Learn the career opportunities in cybersecurity include top certification to boost your career 
  • Become familiar with the techniques and motivations of hackers 
  • Discover the different tools used by hackers 
  • Learn how to protect yourself from hackers 
  • Understand the Cybersecurity standards and the differences between them 

Prerequisites

  • Basic computer skills 
  • Basic knowledge of VirtualBox 
  • Admin rights may be required for software installation 
  • Laptop must have at least 4 GB free of RAM (for Kali Linux & Windows Virtual machines) 

Who Should Attend

  • Anyone interested in starting his/her career in cybersecurity 
  • Anyone interested in knowing much more about the cybersecurity field and its market size.
  • IT technicians: System engineers, Network engineers, DB Administrators, Software engineers, developers, …  
  • Security engineers who would like to increase their knowledge in standards and laws for example. 
  • Freelancers or other creative professionals.

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Welcome to the course!
2Module 1 - The Cybersecurity Field
3Module 2 - Hacker’s techniques and motivations
4Module 3 - Cybersecurity law and standards
5Quizzes
Ahmed Zekraoui

Ahmed Zekraoui

Ahmed is a seasoned cybersecurity professional with a rich background in safeguarding complex IT environments. He holds a degree in Information Technologies from Université Libre de Tunis and has pursued advanced studies in Telecommunications at SUP'COM, equipping him with a strong foundation in both the technical and strategic aspects of cybersecurity.

Ahmed's career spans various roles, including Data Center Engineer and System Administrator, where he developed expertise in incident response, Security Information and Event Management (SIEM), and endpoint protection. His dedication to advancing the cybersecurity field is evident through his continuous learning and professional certifications in Cloud Security, reflecting his commitment to staying ahead of emerging threats and technologies.

Fluent in French, English, and Arabic, Ahmed excels in communicating complex security concepts across diverse teams and international environments. His instructional approach emphasizes real-world scenarios and practical knowledge, offering learners actionable insights and the skills necessary to succeed in today’s rapidly evolving cybersecurity landscape.

With his technical acumen and hands-on experience, Ahmed is a valuable asset to any platform focused on cybersecurity education and innovation.

VIEW MY CHANNEL

Segment - 01 - Introduction

Segment - 02 - General overview about Cyber Security

Segment - 03 - What Cybersecurity is?

Segment - 04 - Cyberstats

Segment - 05 - Cybersecurity market size

Segment - 06 - Confusions: Cybersecurity or Cyber Security

Segment - 07 - Confusions: Cybersecurity vs information security

Segment - 08 - Cybersecurity professional roadmap

Segment - 09 - Salary

Segment - 10 - Top cybersecurity certifications by

Segment - 11 - Understand hacker’s mindset

Segment - 12 - Hackers Categories

Segment - 13 - IoT

Segment - 14 - What motivates hackers to hack?

Segment - 15 - Understand the cybersecurity kill chain - 01

Segment - 16 - Understand the cybersecurity kill chain - 02

Segment - 17 - Hacking techniques

Segment - 18 - Malicious software used by hackers

Segment - 19 - [LAB] How hackers generate malicious software?

Segment - 20 - [LAB] How to detect that your machine is infected and how to protect yourself?

Segment - 21 - Laws and standards that you need to know

Segment - 22 - ISO27001

Segment - 23 - NIST Framework

Segment - 24 - PCI-DSS

Segment - 25 - PCI-DSS Compliant

Segment - 26 - Laws Introduction

Segment - 27 - Cybersecurity USA, EU & Australia Laws

Segment - 28 - Last Power

Segment - 29 - Conclusion

About the Course - Introduction to Cybersecurity

Instructor bio - Ahemd Zekraoui

Quiz - Cybersecurity Path

Quiz - Cybersecurity Laws & Standards

Quiz - Hackers Techniques & Motivation