Cybersecurity Basics I Cybersecurity 101

Are you interested in learning about Cybersecurity? Look no further than this full guide that is designed to give you a broad, basic understanding of various cybersecurity concepts as well as various things you can do to continue your cybersecurity journey.

#studiosec #cybersecurity #security+ #cybersecurity101 #infosec #learncybersecurity

Find me at:
Website -
Twitter -
Buy Merch -
Discord -
Medium -

Interested in starting a lab or sprucing up your home office? Check out these affiliate links for cool things I highly recommend! These also go to help support the channel!

For Security+:
Security+ eBook:
Security+ Practice Tests:

Yubikey For MFA:

Ultimate Home Lab:
For VMs | ASUS ROG Laptop:
4k Monitor | MSi Optix MAG321CURV:
HD Monitor | Acer 1080p Monitor:
Ultimate Raspberry Pi Starter Kit:
Wireless Keyboard/Mouse Pair:
HDMI Cord:
Wire Sleeve:
Wifi Dongle:
Big fat power strip:

Basic Dynamic Home Lab:
For VMs | (More Affordable) Beefy Desktop:
HD Monitor | Acer 1080p Monitor:
Raspi 4:
Organize RPis | Raspi Tower:
Wireless Keyboard/Mouse Pair:
Wire Sleeve:
USB C adapter:
Wifi Dongle:
HDMI Cord:
Big fat power strip:

Keep Desk Tidy:
Wire Sleeve:
Cleaner Desk | Desk Organizer:
Maximize Space | Monitor Platform:

Cool Cybersecurity Toys For Your Lab:
Powerful Charging Station:
WiFi Pineapple:
Long Range Antenna:
GPS dongle:
Card reader:
Seagate External HD:
Hue Lights:

0:00 Intro
1:10 Ethics in Cybersecurity
10:06 Keeping Up In Cybersecurity
19.12 Keeping Up With Attackers
25:26 Humans & Cybersecurity
33:35 OPSEC
42:15 Cybersecurity Jobs
55:42 Resumes
1:10:26 Data Storytelling
1:17:53 Affordable Homelabs
1:25:32 TryHackMe Overview
1:31:58 HackTheBox Overview
1:44:53 NIST Framework
1:54:06 CIA Triad
2:01:17 Top 10 Infosec Terms
2:10:51 Risk Overview
2:15:28 Risk Assessments
2:22:32 Cybersecurity Governance
2:34:26 Cybersecurity Policies
2:38:15 OSI Model
2:43:01 Cloud v On-Prem
2:51:37 Virtualization
2:58:32 Containerization
3:05:52 VPN Overview
3:11:57 Hashing v Encryption
3:23:37 SCADAs
3:27:57 SIEMs
3:36:49 Bug Bounties
3:45:51 Ransomware
3:50:00 Operating Systems
4:02:07 Cyberattack Types
4:14:39 Threat Actor Types
4:28:39 Threat Hunting
4:43:04 Cybersecurity Technologies
4:49:19 Cybersecurity Tools
5:00:55 Networking Tools
5:09:10 Vulnerabilities
5:22:48 Enterprise Security
5:30:20 Indicators of Compromise (IOCs)
5:42:35 Penetration Testing
5:51:01 Vulnerability Scanning
5:58:42 Malware
6:09:49 Cyberattack Types II
6:40:49 Social Engineering
6:51:29 You Survived
Be the first to comment