Cyber Security
Discover the essential skills for a career in cybersecurity. Understand key terms, explore current threats, and learn fundamental concepts to help you navigate the cybersecurity landscape with confidence.
Lesson 1: Understanding the cybersecurity frameworks and standards
Lesson 2: What you should know
Lesson 3: Understanding the Cyber Kill Chain
Lesson 4: Pre-cyber threats
Lesson 5: The emergence of the cyber threats
Lesson 6: Botnets and the cybercrime industry
Lesson 7: Cloaking and alternate data streams
Lesson 8: Hiding using processes
Lesson 9: Controlling the target through a rootkit
Lesson 10: Phishing and watering holes
Lesson 11: Understanding advanced persistent threats
Lesson 12: Ransomware- A modern form of extortion
Lesson 13: Hardware implants and other cyber FUD
Lesson 14: The Orange Book- Early concepts in computer security
Lesson 15: Understanding the NIST Cybersecurity Framework
Lesson 16: Adopting the NIST Cybersecurity Framework
Lesson 17: Understanding the basics of cyber risk
Lesson 18: Analyzing cyber threats and controls
Lesson 19: Recording, reporting, and the risk context
Lesson 20: An advanced risk framework
Lesson 21: Managing security with COBIT
Lesson 22: COBIT for operational security
Lesson 23: Introduction to cybersecurity controls
Lesson 24: Cybersecurity control framework
Lesson 25: Cybersecurity standards of good practice
Lesson 26: Architecting for security
Lesson 27: Protecting payment card data
Lesson 28: Clouding the issues
Lesson 29: Securing things on the internet
Lesson 30: Making sure security is effective
Lesson 31: Incident management basics
Lesson 32: Measuring incident management maturity
Lesson 33: Detecting an attack
Lesson 34: Hunting for threats
Lesson 35: Responding to an incident
Lesson 36: Cybersecurity goes global
Lesson 37: Understanding cyber norms
Lesson 38: Cybil and the Global Forum on Cyber Expertise
Lesson 39: The Traffic Light Protocol
Lesson 1: Welcome to Cybersecurity Terminology
Lesson 2: What is cybersecurity
Lesson 3: People, Process, and Technology
Lesson 4: Security Awareness and Leadership
Lesson 5: Red vs. Blue vs. Purple Teams
Lesson 6: Who are the Adversaries
Lesson 7: Understanding Privacy
Lesson 8: Technical Controls
Lesson 9: Secure Practices, Terms, and Exercises
Lesson 10: Network Controls
Lesson 11: Advancements in Technology
Lesson 12: Threat Actors and Definitions
Lesson 13: Technical Risks
Lesson 14: Threats that Target the Human Element
Lesson 15: Apply Cybersecurity Terminology
Lesson 1: Examine the Cybersecurity Threat Landscape
Lesson 2: Explore the Threat of Malware and Ransomware
Lesson 3: Protect Against Malware and Rnsomware
Lesson 4: Explore the Threat of Phishing and Smishing
Lesson 5: Protect Against Phishing and Smishing
Lesson 6: Explore the Threat of Business Email Compromise
Lesson 7: Protect Against Business Email Compromise
Lesson 8: Explore the Threat of Botnets and DDoS Attacks
Lesson 9: Protect Against Botnets and DDoS Threats
Lesson 10: Explore the Threat of Deepfakes
Lesson 11: Protect Against Deepfakes
Lesson 12: Explore the Risk of Insider Threats
Lesson 13: Protect Against Insider Threats
Lesson 14: Explore the Threat of Unmanaged IoT Devices
Lesson 15: Protect Against Unmanaged IoT Devices
Lesson 16: Explore the Threat of Shadow IT
Lesson 17: Protect Against Shadow IT
Lesson 18: The Threat of Supply Chain Attacks and Third-Party Risks
Lesson 19: Protect Against Supply Chain Attacks and Third-Party Risks
Lesson 20: Stay Up to Date on Cybersecurity
Assessment
In this course, you will learn key terminologies, and explore the current threat landscape in this comprehensive Cybersecurity Foundations.