⭐⭐⭐⭐🕑TIME STAMP📋⭐⭐⭐⭐⭐ Cybersecurity For Beginners By Google: ua-cam.com/video/Ieegg45Pojw/v-deo.html ❶ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS Introduction to Computers and Operating systems 🕛00:00 Course Introduction 🕛14:13 Threat Landscape 🕛23:35 Introduction to Computing devices 🕛34:32 Operating systems Enterprise Systems and Security 🕛49:21 Servers Storage and Backups 🕛1:00:36 Computing Environments 🕛1:11:46 Maintenance and Patches Business Systems Applications 🕛1:26:27 Business Software 🕛1:36:15 Email Apps 🕛1:47:00 Storage Solutions Computers Operating Systems and Security 🕛2:09:26 Final Course assessment 🕛2:13:54 Course Wrap up ➋ INTRODUCTION TO NETWORKING AND CLOUD COMPUTING Computer Networking 🕛2:16:46 Course introduction 🕛2:21:55 Types and Topologies 🕛2:32:52 IP Addressing Network Devices and Protocols 🕛2:51:22 Infrastructure 🕛3:03:24 Network Communication Models 🕛3:16:00 Protocols and ports 🕛3:26:40 Network Traffic monitoring Network Security 🕛3:41:09 Network Client and Server 🕛3:52:19 Authentication and Authorization 🕛4:08:09 Firewalls and Security tools Cloud Computing and Networking 🕛4:37:44 Introduction to Azure 🕛4:46:34 Virtual Environments 🕛4:59:47 Cloud Services 🕛5:14:33 X as A Service Networking and Cloud Computing 🕛5:30:02 Final Course Project and Assessment 🕛5:37:35 Course wrap up ➌ CYBERSECURITY THREAT VECTORS AND MITIGATION Threats and attacts 🕛5:40:33 Course introduction 🕛5:44:05 Epic attacts 🕛5:53:59 Theats vectors 🕛6:11:24 Mitigation Strategies Cryptography 🕛6:26:24 Encryption 🕛6:33:41 Public Private key and hashing 🕛6:49:15 Digital Signing and certificates 🕛7:04:27 Authentication and Authorization Network and Device Based threats 🕛7:19:42 Data Transmission 🕛7:35:49 Security controls 🕛7:50:47 Application Updates Security Compliance and Identity 🕛8:06:06 Security and Compaince Concepts 🕛8:19:41 ID and Active Directory 🕛8:34:46 Defence Models Cybersecurity Threat Vectors and Mitigation 🕛8:49:23 Final Course Project and Assessment 🕛8:55:16 Course Wrap up ➍CYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD Identity Services 🕛8:58:01 Course introduction 🕛9:02:53 Azure Active Directory 🕛9:24:20 Azure Active Directory and Editions 🕛9:36:51 Azure Active Directory Identity types Active Directory Authentication 🕛9:58:09 Authentication Methods 🕛10:31:30 Multi-Factor Authentication 🕛10:51:25 Password Protection and Resetting Active Directory Access Protection and Governance Management 🕛11:17:11 Condition Access 🕛11:33:46 Roles and Role Based Access 🕛11:45:44 Identity Governance 🕛12:06:51 Privileged Identity management and Protection Identity and Access Solutions 🕛12:26:15 Final Course Project Assessment 🕛12:33:24 Course Wrap up ➎CYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER Azure Basics Security Capabilities 🕛12:36:56 Course Introduction 🕛12:41:24 Distributed Denial of Service DDOS Protection 🕛13:04:21 Azure Firewall Protection 🕛13:36:11 Just In Time Access and Encryption Security Management in Azure 🕛13:56:32 Introduction to Cloud Security 🕛14:14:46 Virtual Security Solutions 🕛14:30:03 Azure Standards and Policies 🕛14:42:48 Introduction to SIEM and SOAR Microsoft 365 Defender Threat Protection 🕛15:08:04 Defender Services 🕛15:31:47 Endpoints and Cloud Apps Security 🕛16:05:11 Identity Defence Graded Assessment and Course Wrap up 🕛16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender 🕛16:48:18 Course Wrap up ➏CYBERSECURITY TOOLS AND TECHNOLOGIES Penetration testing 🕛16:52:36 Course Introduction 🕛16:56:34 Defence and Offense red versus blue 🕛17:14:30 Testing Stages 🕛17:49:38 Types of Penetration Test Preventative Tools 🕛18:13:29 Intrusive Detection and Prevention Systems 🕛18:42:23 Designing Firewalls Solutions in Azure 🕛18:58:55 Azure virtual Private Network VPN 🕛19:37:35 Vulnerability Management Azure Penetration Testing 🕛20:08:57 The Command LIne and Windows Powershell 🕛20:34:49 Setting up Azure for Testing 🕛21:13:43 Running the Test Final Project and Assessment Cybersecurity Tools and Technologies 🕛21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies 🕛21:48:14 Wrap up Cybersecurity tools and technologies ➐CYBERSECURITY MANAGEMENT AND COMPILIANCE Security Administration 🕛21:52:43 Course Introduction 🕛21:56:54 Cloud Security Planning 🕛22:29:28 Cloud adoption framework 🕛22:44:54 Data Management and Administration 🕛23:08:13 Availability and Continuity Compliance Solutions 🕛23:58:47 Compliance Management 🕛24:46:38 Insider Risk 🕛25:14:34 Information Protection and Data lifecycle Laws and Standards 🕛25:47:59 Information Security Management Act ISMA 🕛26:16:26 So International Organizing For Standardization Standards 🕛26:37:44 Control Objectives for Information and related Technologies Cobit Final Project and Assessment Cybersecurity Managent and Compliance 🕛27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance 🕛27:12:41 Course Wrap up Cybersecurity Management and Compliance ➑ ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT Threat Modeling 🕛27:17:09 Course Introduction 🕛27:20:53 Introduction to Threats Modeling 🕛27:48:26 Threat Modeling Strategies 🕛28:26:47 Azure and threat Modeling Advanced Threats and Mitigation 🕛28:56:55 Susceptible infrastructure and Types of attack 🕛29:32:02 IOT Internet of things and common attacks Security Conscious Modeling 🕛30:23:15 Entry Point and Associated Risks 🕛30:45:36 Secure network Design with Defence in Depth 🕛31:13:19 Mitigation Strategies Capstone Project 🕛31:53:02 Capstone Project 🕛32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone ➒ MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE Concepts of Security Compliance and Identity 🕛32:09:39 Welcome to the Course 🕛32:15:46 Microsoft Certification 🕛32:20:06 Security and Compliance Concepts 🕛32:50:46 Identity Concepts The Capabilities of Microsoft Azure Active Directory 🕛33:29:52 Authentication Capabilities of Azure AD 🕛33:45:29 Access Management Capabilities of Azure AD 🕛34:01:09 Identity Protection and Governance Capablities of Azure AD Microsoft Security Solutions 🕛34:19:19 Basic Security Capabilities in Azure 🕛34:41:11 Azure Security Management 🕛35:03:03 Security Capabilities of Microsoft Sentinel 🕛35:18:31 Threat protection with Microsoft 365 Defender The Capablities of Microsoft Compliance Solutions 🕛35:49:49 Microsoft Service Trust Portal Privacy Principles 🕛36:03:00 Compliance Management Capabilities of Microsoft Purview 🕛36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft Risk and Resource Governance 🕛36:49:00 Describe insider risk capabilities in Microsoft Purview 🕛37:07:50 Resource governance Capablities in Azure Practice Exam 🕛37:29:44 SC-900 Practice-Exam 🕛37:35:37 Course Wrap up
Absolutely mind-blowing that you can get a 38hrs worth of knowledge without paying a dime for it! I've been taking advantage of such opportunities for years, but it still amazes me sometimes. Hands down the best time to be alive in human history.
@@thomas0086there’s no knowledge that’s “gate kept” brotha and you know it. everything you wanna know is all public info, everything taught in schools is public info. you only pay for the diploma and whatever else you get for going to a 4 year
So many haters here... Not everyone has a kali vm inside of Parrot on a TAILS vm, but everyone does have to start somewhere. Anyone actually in security knows that an uneducated user is one of the biggest risks. The weather someone is here to start their journey or just to have a better understanding, props to you and keep it up.
Thank you so much, not only did you compile all the lessons into one video, you also provided the lesson and reading content as well. Also before anyone comes at me, yes, this is probably illegal but not all of us can afford to pay for every lesson and some of us desperately need to learn. Knowledge should be free :(
A tip that helps me. When shit gets too complicated, take a step away. Listen to some music without lyrics and instead of trying to solve the problem you’re stuck on; think about what the problem is entails. Think of the logical steps that makeup the problem and then begin dissecting it with your basic understanding of the topic. You’ll be able to find out quickly what you did and did not retain…. After I hit the third or fourth challenging topic/question that forces me to step away; is when I know my brain is maxed out for the day. I’ll stop working for the rest of the day, enjoy some food and continue thinking about the subject so I can solve the problem with a level mind after a good nights rest. I’ve even solved issues in my dreams because I think about it so much lmao hopefully this helps others retain all that complex data! Most people don’t have a routine like this so if this doesn’t appeal to you take some time and come up with your own routines. I’m sure there’s plenty more effective ways to retain this information. Good luck everyone!
Disagree. If context and fundamentals aren’t understood then you can be hands on keyboard and doing something based on experience just because “it works.” It’s imperative to understand the “why” and “what” before doing the “how”.
The time has finally come! I will complete every hour, every minute and every second of this course. There is no one to stop me but myself. Comment if you believe in me!
I would recommend to go through job descriptions of IT analyst, cyber security consultant that are every level jobs and cyber security roadmap before starting this course. This will familiarize you to concepts and improve understanding of the concept better.
I work in IT and I will tell you straight up right now the job market is absolutely brutal. LOTS of ghost jobs being posted, positions being left open but nobody is actually filling them. It took me over a year of rage applying just to find a decent IT job. Getting into the industry ESPECIALLY cybersecurity is not as simple as this video makes it seem. You are not going to get a cyber security job just from getting this microsoft cert. I have A+ Network+ Security+ and CySA+ and even then I had a very difficult time finding a job.
Quick quesion. If certificates don't make it easier to find a job then what is it then ? A project ? Currently I'm on semester 1 majoring in comp. Science
I'm starting today. 27/08/2014. I will come back when I have completed it to give feedback. So far it's great for beginners. I am a system administrator and this is good.
One needs to take and learn this for Personal Knowledge…This is mind blowing 😮, I’ve always been curious more about how the internet works beyond browsing and accessing the internet.
Age is just a number and time is an illusion so start studying until you die don't think this is for us Or not. What ever you are thinking that's for you...
whatching this course is just like reading a modern manual, that goes like: screw hole - thats to screw a hole. PRESS Button- thats the Button to press. Light switch - thats the switch for the light. sleeping bed - thats the bed for sleep
I am starting today 31-08-2024 and I will be watching at least 2 hours per day also studying Python, but I need to decide If I go through Cybersecurity path or through Cloud path...both of them are very exciting to me
So passionate about the course I'm ready and willing to dive in and learn cybersecurity so interesting and all the basics ....wish me best of luck and good ending
OMG this the first time in my whole life seen around 40 hrs. course on UA-cam with massive information like that .. Mind blowing.. I'm so grateful for you guys
Can someone clarify whether this course is intended only for beginners, focusing solely on concepts, or if it also provides in-depth knowledge suitable for individuals without an IT background?
So guys today is 10 September I'll try to start this along with my mid sems and placements scenarios in between lets see how much time i take to complete it Ps:feel free to comment or like so I'm reminded about it
Wow incredible 👏 I've been looking for an opportunity like this, and I now have the right resources to start my cybersecurity journey 🥺🥺💪 Thank you so much for this 🙏🙏 I'll share my experience when I'm done ✅
The best way to learn, defensive security is to master offensive security, and to do that at best you should learn to use every major tool available in Kali Linux to attack yourself with to practice and master reach tool. Because if you know how to attack successfully, then you know how to defend yourself successfully. Because you know how they’re attacking you with things like Maltego and so on. unless you find yourself being observed in such a manner in such a sophisticated way, then you can consider yourself a person of interest, and that you’re probably not being attacked by a hacker, rather being investigated by a law-enforcement officer. Hearing this, Microsoft tutorial is really embarrassing from Microsoft in my eyes, because it reveals just how little Microsoft knows about protecting it own systems.
37:32:32 I just finished the course and goodness me😮😮😮 I need a break due to lots of sleepless nights and trying to understand as much as I can. PS I am a total beginner. I'll come back in few hours or days to drop tips on how to successfully study this course and understand.
Export the Azure, Chat GPT, Revit, Plant 3D, Civil 3D, Inventor, ENGI file of the Building or Refinery to Excel, prepare Budget 1 and export it to COBRA. Prepare Budget 2 and export it to Microsoft Project. Solve the problems of Overallocated Resources, Planning Problems, prepare the Budget 3 with which the construction of the Building or the Refinery is going to be quoted.
I appreciate the valuable content in your cybersecurity course. However, I've noticed the absence of subtitles. Adding subtitles would make the course more accessible to a wider audience, including those with hearing impairments or non-native speakers. Please consider this for a more inclusive learning experience. Thank you!
Has anyone here already finished this nearly 38-hour video? By the way, I'm starting this journey today, September 9, 2024, at exactly 11:38 AM. I hope I can finish it!
⭐⭐⭐⭐🕑TIME STAMP📋⭐⭐⭐⭐⭐
Cybersecurity For Beginners By Google: ua-cam.com/video/Ieegg45Pojw/v-deo.html
❶ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS
Introduction to Computers and Operating systems
🕛00:00 Course Introduction
🕛14:13 Threat Landscape
🕛23:35 Introduction to Computing devices
🕛34:32 Operating systems
Enterprise Systems and Security
🕛49:21 Servers Storage and Backups
🕛1:00:36 Computing Environments
🕛1:11:46 Maintenance and Patches
Business Systems Applications
🕛1:26:27 Business Software
🕛1:36:15 Email Apps
🕛1:47:00 Storage Solutions
Computers Operating Systems and Security
🕛2:09:26 Final Course assessment
🕛2:13:54 Course Wrap up
➋ INTRODUCTION TO NETWORKING AND CLOUD COMPUTING
Computer Networking
🕛2:16:46 Course introduction
🕛2:21:55 Types and Topologies
🕛2:32:52 IP Addressing
Network Devices and Protocols
🕛2:51:22 Infrastructure
🕛3:03:24 Network Communication Models
🕛3:16:00 Protocols and ports
🕛3:26:40 Network Traffic monitoring
Network Security
🕛3:41:09 Network Client and Server
🕛3:52:19 Authentication and Authorization
🕛4:08:09 Firewalls and Security tools
Cloud Computing and Networking
🕛4:37:44 Introduction to Azure
🕛4:46:34 Virtual Environments
🕛4:59:47 Cloud Services
🕛5:14:33 X as A Service
Networking and Cloud Computing
🕛5:30:02 Final Course Project and Assessment
🕛5:37:35 Course wrap up
➌ CYBERSECURITY THREAT VECTORS AND MITIGATION
Threats and attacts
🕛5:40:33 Course introduction
🕛5:44:05 Epic attacts
🕛5:53:59 Theats vectors
🕛6:11:24 Mitigation Strategies
Cryptography
🕛6:26:24 Encryption
🕛6:33:41 Public Private key and hashing
🕛6:49:15 Digital Signing and certificates
🕛7:04:27 Authentication and Authorization
Network and Device Based threats
🕛7:19:42 Data Transmission
🕛7:35:49 Security controls
🕛7:50:47 Application Updates
Security Compliance and Identity
🕛8:06:06 Security and Compaince Concepts
🕛8:19:41 ID and Active Directory
🕛8:34:46 Defence Models
Cybersecurity Threat Vectors and Mitigation
🕛8:49:23 Final Course Project and Assessment
🕛8:55:16 Course Wrap up
➍CYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD
Identity Services
🕛8:58:01 Course introduction
🕛9:02:53 Azure Active Directory
🕛9:24:20 Azure Active Directory and Editions
🕛9:36:51 Azure Active Directory Identity types
Active Directory Authentication
🕛9:58:09 Authentication Methods
🕛10:31:30 Multi-Factor Authentication
🕛10:51:25 Password Protection and Resetting
Active Directory Access Protection and Governance Management
🕛11:17:11 Condition Access
🕛11:33:46 Roles and Role Based Access
🕛11:45:44 Identity Governance
🕛12:06:51 Privileged Identity management and Protection
Identity and Access Solutions
🕛12:26:15 Final Course Project Assessment
🕛12:33:24 Course Wrap up
➎CYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER
Azure Basics Security Capabilities
🕛12:36:56 Course Introduction
🕛12:41:24 Distributed Denial of Service DDOS Protection
🕛13:04:21 Azure Firewall Protection
🕛13:36:11 Just In Time Access and Encryption
Security Management in Azure
🕛13:56:32 Introduction to Cloud Security
🕛14:14:46 Virtual Security Solutions
🕛14:30:03 Azure Standards and Policies
🕛14:42:48 Introduction to SIEM and SOAR
Microsoft 365 Defender Threat Protection
🕛15:08:04 Defender Services
🕛15:31:47 Endpoints and Cloud Apps Security
🕛16:05:11 Identity Defence
Graded Assessment and Course Wrap up
🕛16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender
🕛16:48:18 Course Wrap up
➏CYBERSECURITY TOOLS AND TECHNOLOGIES
Penetration testing
🕛16:52:36 Course Introduction
🕛16:56:34 Defence and Offense red versus blue
🕛17:14:30 Testing Stages
🕛17:49:38 Types of Penetration Test
Preventative Tools
🕛18:13:29 Intrusive Detection and Prevention Systems
🕛18:42:23 Designing Firewalls Solutions in Azure
🕛18:58:55 Azure virtual Private Network VPN
🕛19:37:35 Vulnerability Management
Azure Penetration Testing
🕛20:08:57 The Command LIne and Windows Powershell
🕛20:34:49 Setting up Azure for Testing
🕛21:13:43 Running the Test
Final Project and Assessment Cybersecurity Tools and Technologies
🕛21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies
🕛21:48:14 Wrap up Cybersecurity tools and technologies
➐CYBERSECURITY MANAGEMENT AND COMPILIANCE
Security Administration
🕛21:52:43 Course Introduction
🕛21:56:54 Cloud Security Planning
🕛22:29:28 Cloud adoption framework
🕛22:44:54 Data Management and Administration
🕛23:08:13 Availability and Continuity
Compliance Solutions
🕛23:58:47 Compliance Management
🕛24:46:38 Insider Risk
🕛25:14:34 Information Protection and Data lifecycle
Laws and Standards
🕛25:47:59 Information Security Management Act ISMA
🕛26:16:26 So International Organizing For Standardization Standards
🕛26:37:44 Control Objectives for Information and related Technologies Cobit
Final Project and Assessment Cybersecurity Managent and Compliance
🕛27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance
🕛27:12:41 Course Wrap up Cybersecurity Management and Compliance
➑ ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT
Threat Modeling
🕛27:17:09 Course Introduction
🕛27:20:53 Introduction to Threats Modeling
🕛27:48:26 Threat Modeling Strategies
🕛28:26:47 Azure and threat Modeling
Advanced Threats and Mitigation
🕛28:56:55 Susceptible infrastructure and Types of attack
🕛29:32:02 IOT Internet of things and common attacks
Security Conscious Modeling
🕛30:23:15 Entry Point and Associated Risks
🕛30:45:36 Secure network Design with Defence in Depth
🕛31:13:19 Mitigation Strategies
Capstone Project
🕛31:53:02 Capstone Project
🕛32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone
➒ MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE
Concepts of Security Compliance and Identity
🕛32:09:39 Welcome to the Course
🕛32:15:46 Microsoft Certification
🕛32:20:06 Security and Compliance Concepts
🕛32:50:46 Identity Concepts
The Capabilities of Microsoft Azure Active Directory
🕛33:29:52 Authentication Capabilities of Azure AD
🕛33:45:29 Access Management Capabilities of Azure AD
🕛34:01:09 Identity Protection and Governance Capablities of Azure AD
Microsoft Security Solutions
🕛34:19:19 Basic Security Capabilities in Azure
🕛34:41:11 Azure Security Management
🕛35:03:03 Security Capabilities of Microsoft Sentinel
🕛35:18:31 Threat protection with Microsoft 365 Defender
The Capablities of Microsoft Compliance Solutions
🕛35:49:49 Microsoft Service Trust Portal Privacy Principles
🕛36:03:00 Compliance Management Capabilities of Microsoft Purview
🕛36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft
Risk and Resource Governance
🕛36:49:00 Describe insider risk capabilities in Microsoft Purview
🕛37:07:50 Resource governance Capablities in Azure
Practice Exam
🕛37:29:44 SC-900 Practice-Exam
🕛37:35:37 Course Wrap up
please add subtitles auto thanks
I wish you had added English subtitles :( it could have been a video accessible to many more people.
@@volkanzeyrek3844I agree
I'm very grateful for this...Please sorry to ask but how can we download this... It seems very long for active internet viewing...
Blessing to you!!!
Absolutely mind-blowing that you can get a 38hrs worth of knowledge without paying a dime for it!
I've been taking advantage of such opportunities for years, but it still amazes me sometimes.
Hands down the best time to be alive in human history.
100%
You have to give your time
And that fact in itself is sad…
Knowledge gate kept behind a manipulated monetary system is a disadvantage to our entire species.
does doing this add to anything?
@@thomas0086there’s no knowledge that’s “gate kept” brotha and you know it. everything you wanna know is all public info, everything taught in schools is public info. you only pay for the diploma and whatever else you get for going to a 4 year
Remember back in the day when they would roll the TV/VCR into the classroom on that cart? The directing of this is every 90s instructional video.
So good or bad?
@@celiskurtis I love the nostalgia I am experiencing so good 😊
its coursera lol
I am here to start today, 25.08.2024, wish me best of luck! I am going to dive in the ocean of knowledge, Thanks. Do or die.
How's it going ?
good luck, keep the hard work
You gots this 💪
r u done??? how is it going?
Hello bro any news about you
Amazing videos for beginners, thank you! To your channel
Okay, so I have completed this course in 15 days, 3hrs daily, Thankyou very much !
Bro tell me worth or not?
, if you don't know anything about cybersecurity, it's 100% worth it.
@@zeeshanali5425 thanks 💯 I'll give it a try
Rn im following cyber mentor playlist
So many haters here... Not everyone has a kali vm inside of Parrot on a TAILS vm, but everyone does have to start somewhere. Anyone actually in security knows that an uneducated user is one of the biggest risks. The weather someone is here to start their journey or just to have a better understanding, props to you and keep it up.
Brother can i talk to you ?
lol 😂😂😂😂 this is a good response.
Uh-huh.
Got tails on one of USBs but due to 1 Laptop compromissed. So gotta *Right to repair* using DIY.
Cause I'm busy - *24/7*
However I digress.
@@JazRealEstateBuyerHi #bot
@@sakhawat_2002 *Hi* #bot
I’m a sys admin and this course is actually good AF!
have you looked over or reviewed this course? where should I start the SC900?
Thank you so much, not only did you compile all the lessons into one video, you also provided the lesson and reading content as well. Also before anyone comes at me, yes, this is probably illegal but not all of us can afford to pay for every lesson and some of us desperately need to learn. Knowledge should be free :(
Its not illegal to educate yourself family
You are totally correct b
W message
A tip that helps me. When shit gets too complicated, take a step away. Listen to some music without lyrics and instead of trying to solve the problem you’re stuck on; think about what the problem is entails. Think of the logical steps that makeup the problem and then begin dissecting it with your basic understanding of the topic. You’ll be able to find out quickly what you did and did not retain…. After I hit the third or fourth challenging topic/question that forces me to step away; is when I know my brain is maxed out for the day. I’ll stop working for the rest of the day, enjoy some food and continue thinking about the subject so I can solve the problem with a level mind after a good nights rest. I’ve even solved issues in my dreams because I think about it so much lmao hopefully this helps others retain all that complex data! Most people don’t have a routine like this so if this doesn’t appeal to you take some time and come up with your own routines. I’m sure there’s plenty more effective ways to retain this information. Good luck everyone!
I can't believe that this lesson is free !
I'm so gratefull that I found this masterpiece
Thank all of you to provide this course
Nothing beats hands-on experience. Nothing.
Preach!
True 😭
yes it's true
and videos sucks
Disagree. If context and fundamentals aren’t understood then you can be hands on keyboard and doing something based on experience just because “it works.” It’s imperative to understand the “why” and “what” before doing the “how”.
The time has finally come!
I will complete every hour, every minute and every second of this course.
There is no one to stop me but myself.
Comment if you believe in me!
I don't believe in you 😂
I believe it! There is no one to stop you but yourself!
@@SyedTaqeeulla What do I need to do to earn your belief!?
I challenge you, to stop you.😂
Big deal snowflake!
Always passionate about starting a career in cybersecurity. Here I found the video today. Thanks Nerd's lesson. Ill start today. Wish me success.
Starting today as well,we will be back
15-09-24 i am starting today be with me till the end . Wish you all good luck❤
I'm also going to start today bro
How far ?
Starting this course today, I hope it helps in my cyber security journey
Starting today learn new things today .today is the day that i stop scrolling in Facebook😊
How's it's going? I'm trying to get stuck in as well 😊
I would recommend to go through job descriptions of IT analyst, cyber security consultant that are every level jobs and cyber security roadmap before starting this course. This will familiarize you to concepts and improve understanding of the concept better.
💯
Thanks for the advice
this video is for beginners who doesn't have any background and want to start learning from 0.
I’m at Zero wish me luck. I honestly want to make a difference
I just got here too.
Thought I was the only one. @@ericjones8109
Guys Wish me luck I am starting this course today 8-11-2024.
So any feedback??
I'm starting today, 18 September, 2024 😢.Im totally new in the field,but I need it.Wish me luck.
October 1 here. Let's go!!!
Completed?
November 4th💪
5 hours done for the moment ! Excellent for fundamentals knwoledge.
Haven't played the video yet. But this is mind blowing. Free knowledge.
Need to be mentally ready for this.❤️
you are changing lives. There is no EXCUSE when something like this is available. thank you!!!
I work in IT and I will tell you straight up right now the job market is absolutely brutal. LOTS of ghost jobs being posted, positions being left open but nobody is actually filling them. It took me over a year of rage applying just to find a decent IT job. Getting into the industry ESPECIALLY cybersecurity is not as simple as this video makes it seem. You are not going to get a cyber security job just from getting this microsoft cert. I have A+ Network+ Security+ and CySA+ and even then I had a very difficult time finding a job.
Network bro and be a consultant
Relevant comment, thanks bro
@@favourotasowie7103 Networking will only get you so far. This industry is cutthroat right now with getting a job.
Certs don’t guarantee roles.. if someone is savvy enough, they can get a job off of these skills. This field is greater demand than supply..
Quick quesion. If certificates don't make it easier to find a job then what is it then ? A project ? Currently I'm on semester 1 majoring in comp. Science
27 hours in. No sleep. No food. No water. Wish me luck guys!
RIP friend
Wow
You are learning nothing, just wasting your time
Go on friend
You are doing well
I'm starting today. 27/08/2014. I will come back when I have completed it to give feedback. So far it's great for beginners. I am a system administrator and this is good.
Hi man are you still on it
@@adithy2288hmm
It’s been 3 weeks have you completed it ?
@@Juarez664 I'm yet to finish it. Already halfway through
Huge thanks for this free lesson
One needs to take and learn this for Personal Knowledge…This is mind blowing 😮, I’ve always been curious more about how the internet works beyond browsing and accessing the internet.
I’m starting today 28/09/2024.. God’s grace is all i need
amen 🙏🏽
Thanks i am into cybersecurity since last yr..
I am 43, do you think is too late to start from scrash?
@@karmabet7394it’s not my friend. Everybody had to start from scratch. Good Luck, you will make it
Age is just a number and time is an illusion so start studying until you die don't think this is for us Or not. What ever you are thinking that's for you...
Not too late. I’m 43 also and started class last week. 10mo course.
@@sakhawat_2002 yes
Omg great work, need more patience and time to complete these work hatsoff 🙏thank you 🙏🙏🙏🙏
Thanks for the complete course, and the work you put into developing it into one video.
is this enough to take a test for a certificate and land me a job? what else do you recommend? Thank you
Hi once you understand the fundamentals it will be enough especially for the hands on labs @@Midnightservant1
whatching this course is just like reading a
modern manual, that goes like:
screw hole - thats to screw a hole.
PRESS Button- thats the Button to press.
Light switch - thats the switch for the light.
sleeping bed - thats the bed for sleep
Cybersecurity For Beginners By Google: ua-cam.com/video/Ieegg45Pojw/v-deo.html
@@Nerdslesson Thank you so much ❤❤
@@Nerdslessonhi 😊 can you please tell me if this is great for Mac users as well or just for Microsoft users? Thank you
I found it very interesting since recently I got very interested to learn cybersecurity as an specialist ❤. Good work 👍, keep up. Thank you 🙏
Thank you for uploading Chapters! This is the only channel I’ve seen this implemented in this manner. Keep the courses coming!
Amazing videos for beginner, thank you!
Absolutely an invaluable course!
Thank you
This course is not bad for Beginners
Thank you for the efforts and the precious time you devote to us...Appreciate all and everything. High Quality Training! Can't expect better so far.
Thanks for putting the effort to educate some who are on the line or fence about changing careers and want to see what it entails.
I am starting today 31-08-2024 and I will be watching at least 2 hours per day also studying Python, but I need to decide If I go through Cybersecurity path or through Cloud path...both of them are very exciting to me
Me also bro
I'm at the same crossroad
23.09.2024...started and dive into ocean of knowledge.. I think it will fruitful for me.. Really appriciating this content... ❤😊
Love you guys ❤️ you are the best people on UA-cam ❤️❤️❤️
So passionate about the course I'm ready and willing to dive in and learn cybersecurity so interesting and all the basics ....wish me best of luck and good ending
You can listen to it every night for 30 days until it's in your subconscious mind... instead of being negative
You just have to make it a part of you, like breathing without thinking that your breathing.
OMG this the first time in my whole life seen around 40 hrs. course on UA-cam with massive information like that .. Mind blowing.. I'm so grateful for you guys
Great work! Thank you very much! 🍏🍏🍏🍏🍏🙏
Who ever put this all together, Great work watching this refresh me on a lot of topics.
definitely gives you a very nice intro and overall big picture and landscape of cyber and cloud security. thanks
is this enough to take a test for a certificate and land me a job? what else do you recommend? Thank you
@Midnightservant1 the fact you ask it's an answer itself
@@private7300 not really, because I genuinely don't know.
@@private7300 cause what was the point of replying if you were just gonna be bitter about it
@@sydney4782 reality isn't sweet sometimes
THANK YOU, OTHERS are just looking for MONEY and adds only
Can someone clarify whether this course is intended only for beginners, focusing solely on concepts, or if it also provides in-depth knowledge suitable for individuals without an IT background?
I am so grateful for this course! Mighty blessings
So guys today is 10 September I'll try to start this along with my mid sems and placements scenarios in between lets see how much time i take to complete it
Ps:feel free to comment or like so I'm reminded about it
I appreciate this course and the Mannar it was presented
really this course is that what we learn in cybersecurity ??
Wow incredible 👏 I've been looking for an opportunity like this, and I now have the right resources to start my cybersecurity journey 🥺🥺💪 Thank you so much for this 🙏🙏 I'll share my experience when I'm done ✅
what about course bro, how it is ?
have you done ?
Lol 😂so u think.. u have a looong way to go
Just like you can never eat all the food in time, you can't learn the whole course by watching continuously in one time
Boutta watch this in 2x speed for my ADHD
Could u finish?
need 10x
@@moran339 have you?
Salute amd respect to the uploder 🙏🙏
Sharing such knowledge for free
start today date -24-05-2024 i will edit after complete the course
Damn. He never came back.
@@mrshs4332😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂
I hope he is still a live 🫡😁
After knowing Fundamentals of Cybersecurity 😂😅
@@bikashkharel06😂😂😂
Bruh
Am happy and greatly thankful to Nerd's for uploading and making it to simpler to absolutely learner like!
what ! 37hrs course. oow my gratitude to you
This is really interesting! It would be handy as a collection of videos rather than one video to make it easier to move the timeline.
The best way to learn, defensive security is to master offensive security, and to do that at best you should learn to use every major tool available in Kali Linux to attack yourself with to practice and master reach tool. Because if you know how to attack successfully, then you know how to defend yourself successfully. Because you know how they’re attacking you with things like Maltego and so on. unless you find yourself being observed in such a manner in such a sophisticated way, then you can consider yourself a person of interest, and that you’re probably not being attacked by a hacker, rather being investigated by a law-enforcement officer. Hearing this, Microsoft tutorial is really embarrassing from Microsoft in my eyes, because it reveals just how little Microsoft knows about protecting it own systems.
… for beginners
Ain’t no beginner whippin’ out the kali Linux and doing all that. 😂😂😂
Thank very much for these courses, you are real help to me
internet is the best opensource university in the planet
Am glad to see other detamind people here. 🎉
BASED upload ; kudos/congrats u absolute chads
"Your content is always so engaging and well-produced! Keep up the fantastic work!"
Awesome! I need the same created by AWS. I don't want to learn Azure 😂
😂 . I have been waiting for azure instead feels like alot of course are focused on aws.
@@akyblue Azure is out, on UA-cam for "TechTutorialswithPiyush" he has done a great A to Z in the AZURE CLOUD
You might like a cloud guru, praying the best for you!
Microsoft is waaaay better than AWS
@@reezroycas4939 No wayyy
✨sams scoops✨ will take over the world
Complete this course apply Jr cyber security operations engineer
37:32:32 I just finished the course and goodness me😮😮😮 I need a break due to lots of sleepless nights and trying to understand as much as I can.
PS I am a total beginner.
I'll come back in few hours or days to drop tips on how to successfully study this course and understand.
Wow. This is awesome. Thank you. Let's support the channel by subscribing and hitting the like bar.
Wow 🎉awesome 👏
I am currently 7 hours into the office course. I'm learning a lot. My goal is to complete the course before December 2024.
I am here 7:33:59
anyone who completed this video share your experience how was the course
reviews for beginners
Is it worth it for a non IT background?
@@tan2208that’s what I want to know
@@tan2208 yes
@@tan2208was it also with practicals ?
My grandma really liked this course about the world wide webs
Export the Azure, Chat GPT, Revit, Plant 3D, Civil 3D, Inventor, ENGI file of the Building or Refinery to Excel, prepare Budget 1 and export it to COBRA. Prepare Budget 2 and export it to Microsoft Project. Solve the problems of Overallocated Resources, Planning Problems, prepare the Budget 3 with which the construction of the Building or the Refinery is going to be quoted.
Thanks a lot for this cours, i am learning a lot and understanding more than other courses
Long life and prosperity
❤Thanks for this program, awsome🙏👏❤️🙏
can you y split this videos into different playlist it. If you d that it will easy for students to learn this interesting topics .
Chapters in the description box.
I appreciate the valuable content in your cybersecurity course. However, I've noticed the absence of subtitles. Adding subtitles would make the course more accessible to a wider audience, including those with hearing impairments or non-native speakers. Please consider this for a more inclusive learning experience.
Thank you!
Beggars can't be choosers
@@FragmentOfInfinity How kind you are! Thank you for your kind words. The nobility of your character is evident in the subtleties of your response
🤣@@FragmentOfInfinity
Has anyone here already finished this nearly 38-hour video?
By the way, I'm starting this journey today, September 9, 2024, at exactly 11:38 AM. I hope I can finish it!
Can U learn it on phone?
@@Ahmed-zz3ui Yes, you can. I'm learning on my phone right now
@@knowme8230 thanks bro, good luck
@@knowme8230 could you finish this course?
@@knowme8230how far with it ? Was it with practicals ?
Is this video recent? As in how old are the technologies and methodologies? Thank you
Thank you for this video, security education should be free to all.
Is it beneficial? I'm a beginner
@@Naweeela Only for Humans
@@NaweeelaThis may be
Unbelivable!!!
Wow am so grateful thank you so much for the course
Thanks for this ❤
Thanks for making this, my body is ready
I m gonna devote 30 mins on this video everyday. Comment everyday to remind me
did you?
@@saranemes1978 thanks for reminding me
Hi
Such an interesting video. So educative!
Unbelievable 😭🙌
Self Accountability Comment:
Start: October 19, 2024 - Zero Knowledge
End: October … to come
start learning on 15 sept 2024
Are you done ?
Damn , see how ai is slowly taking over a lot of opportunities,
Thank you ❤
Thanks for the providing this course ❤
Please let me leave my timestamp and I will be right back 😂
timestamp: 1:00:44
Can you please upload "Kotlin Android development" course !!!
I highly doubt if they will do this. Android is not a Microsoft product, maybe you can reach out to Google to assist with this request.
I challenge everyone who dived in to this world to come back in 1 year and let us know where he is on his journey.
Sign up by commenting.
october 2024... I'll appreciate a reminder. Thanks in advance