Start Course

This course includes:

  • Video lessons
  • Quiz assessment
  • Survey lessons
  • Certificate of completion

Cybersecurity Tools & Techniques

Created by Youtube External

Last updated: April 2025 | Language:

About this course

A comprehensive introduction to cybersecurity tools, suitable for those starting in the field.


Course content

Provides an overview of essential cybersecurity tools, covering their primary functions and how they support security strategies

An overview of specific tools used in cybersecurity, focusing on their practical applications and configurations.

''Cybersecurity Tutorial for Beginners | Introduction to Cybersecurity | Invensis Learning'' by ''Invensis Learning'' on YouTube

Explores tools like Snort and Suricata, which monitor networks for malicious activities and unauthorized access attempts

A detailed introduction to IDPS tools, including Snort and Suricata, and how they detect threats.

''Intrusion Detection Explained | Snort, Suricata, Cisco Firepower'' by ''Ken Harris'' on YouTube

Provides an overview of endpoint protection, discussing malware protection and the difference between antivirus and EDR.

Explains the functionality of EDR, including how it monitors and collects security-related data.

''Introduction to Endpoint security | EDR basics'' by ''hawkwheels'' on YouTube

Welcome to the quiz section. Before you begin, please make sure you have watched the lesson videos thoroughly, as the questions are designed to test your understanding of key concepts discussed.

Here are a few things to keep in mind:

1. This is a timed quiz, so you’ll need to manage your time effectively.
2. Read each question carefully and choose the best answer based on the material covered in the lesson.
3. The quiz is an excellent opportunity to test your knowledge and reinforce what you’ve learned, so try your best!

An introduction to SIEM fundamentals, discussing how tools like Splunk and QRadar assist in managing and analyzing security data.

Introduces SIEM tools like Splunk and IBM QRadar, which collect and analyze log data across systems for threat intelligence and response

''IBM Security QRadar SIEM | Introduction to QRadar'' by ''Thinknyx Technologies'' on YouTube



Covers traditional and next-generation firewall tools used to control incoming and outgoing network traffic based on security policies

Focuses on the differences between traditional firewalls and Next-Generation Firewalls (NGFWs), and why NGFWs are crucial in modern network security.

''What is a Firewall? | Traditional + Next Generation'' by ''CertBros'' on YouTube


Delves into tools like Recorded Future and ThreatConnect, which provide insights on evolving threats and adversary tactics

This channel provides in-depth resources on Recorded Future, exploring its threat intelligence capabilities and real-time analytics.

''Transforming Security with AI-Driven Threat Intelligence | Recorded Future''  by ''Recorded Future'' on YouTube



Introduces tools like Metasploit and Burp Suite, used by security professionals to test and assess system vulnerabilities

A thorough walkthrough on using Metasploit, detailing its functionalities for vulnerability assessment and exploitation.

''Nmap, Metasploit, Burp Suite: Hacking Tools Explained Simply |VR403Bots #cybersecurity'' by ''VR 403 Bots -shorts'' on YouTube

Examines tools such as Nessus and OpenVAS, used to scan systems and networks for vulnerabilities and manage patch updates

A comparative guide covering the features of Nessus and OpenVAS for vulnerability assessments.

''Vulnerability Assessment Tools Overview - Nessus vs OpenVAS Scanners'' by ''Cybertalk with YOU'' on YouTube

Discusses tools that monitor and control data transfer to prevent unauthorized data leaks

Provides a detailed look at DLP tools, including how they monitor and control data transfers to prevent leaks.

''What is DLP? Data Loss Prevention for Critical Business Information'' by ''Exabeam'' on YouTube



Focuses on tools like FTK (Forensic Toolkit) and Autopsy that assist in investigating security incidents and collecting evidence

Demonstrates a forensic investigation workflow using FTK Imager and Autopsy, ideal for learning case-building technique.

''USB Forensics using Autopsy and FTK | Digital Forensic'' by ''Solution Directory'' on YouTube