Course curriculum

    1. Lesson 1: Understanding the cybersecurity frameworks and standards

    2. Lesson 2: What you should know

    3. Lesson 3: Understanding the Cyber Kill Chain

    4. Lesson 4: Pre-cyber threats

    5. Lesson 5: The emergence of the cyber threats

    6. Lesson 6: Botnets and the cybercrime industry

    7. Lesson 7: Cloaking and alternate data streams

    8. Lesson 8: Hiding using processes

    9. Lesson 9: Controlling the target through a rootkit

    10. Lesson 10: Phishing and watering holes

    11. Lesson 11: Understanding advanced persistent threats

    12. Lesson 12: Ransomware- A modern form of extortion

    13. Lesson 13: Hardware implants and other cyber FUD

    14. Lesson 14: The Orange Book- Early concepts in computer security

    15. Lesson 15: Understanding the NIST Cybersecurity Framework

    16. Lesson 16: Adopting the NIST Cybersecurity Framework

    17. Lesson 17: Understanding the basics of cyber risk

    18. Lesson 18: Analyzing cyber threats and controls

    19. Lesson 19: Recording, reporting, and the risk context

    20. Lesson 20: An advanced risk framework

    21. Lesson 21: Managing security with COBIT

    22. Lesson 22: COBIT for operational security

    23. Lesson 23: Introduction to cybersecurity controls

    24. Lesson 24: Cybersecurity control framework

    25. Lesson 25: Cybersecurity standards of good practice

    26. Lesson 26: Architecting for security

    27. Lesson 27: Protecting payment card data

    28. Lesson 28: Clouding the issues

    29. Lesson 29: Securing things on the internet

    30. Lesson 30: Making sure security is effective

    31. Lesson 31: Incident management basics

    32. Lesson 32: Measuring incident management maturity

    33. Lesson 33: Detecting an attack

    34. Lesson 34: Hunting for threats

    35. Lesson 35: Responding to an incident

    36. Lesson 36: Cybersecurity goes global

    37. Lesson 37: Understanding cyber norms

    38. Lesson 38: Cybil and the Global Forum on Cyber Expertise

    39. Lesson 39: The Traffic Light Protocol

    1. Lesson 1: Welcome to Cybersecurity Terminology

    2. Lesson 2: What is cybersecurity

    3. Lesson 3: People, Process, and Technology

    4. Lesson 4: Security Awareness and Leadership

    5. Lesson 5: Red vs. Blue vs. Purple Teams

    6. Lesson 6: Who are the Adversaries

    7. Lesson 7: Understanding Privacy

    8. Lesson 8: Technical Controls

    9. Lesson 9: Secure Practices, Terms, and Exercises

    10. Lesson 10: Network Controls

    11. Lesson 11: Advancements in Technology

    12. Lesson 12: Threat Actors and Definitions

    13. Lesson 13: Technical Risks

    14. Lesson 14: Threats that Target the Human Element

    15. Lesson 15: Apply Cybersecurity Terminology

    1. Lesson 1: Examine the Cybersecurity Threat Landscape

    2. Lesson 2: Explore the Threat of Malware and Ransomware

    3. Lesson 3: Protect Against Malware and Rnsomware

    4. Lesson 4: Explore the Threat of Phishing and Smishing

    5. Lesson 5: Protect Against Phishing and Smishing

    6. Lesson 6: Explore the Threat of Business Email Compromise

    7. Lesson 7: Protect Against Business Email Compromise

    8. Lesson 8: Explore the Threat of Botnets and DDoS Attacks

    9. Lesson 9: Protect Against Botnets and DDoS Threats

    10. Lesson 10: Explore the Threat of Deepfakes

    11. Lesson 11: Protect Against Deepfakes

    12. Lesson 12: Explore the Risk of Insider Threats

    13. Lesson 13: Protect Against Insider Threats

    14. Lesson 14: Explore the Threat of Unmanaged IoT Devices

    15. Lesson 15: Protect Against Unmanaged IoT Devices

    16. Lesson 16: Explore the Threat of Shadow IT

    17. Lesson 17: Protect Against Shadow IT

    18. Lesson 18: The Threat of Supply Chain Attacks and Third-Party Risks

    19. Lesson 19: Protect Against Supply Chain Attacks and Third-Party Risks

    20. Lesson 20: Stay Up to Date on Cybersecurity

    1. Assessment

About this course

  • Free
  • 75 lessons
  • 4.5 hours of video content

Gain foundational cybersecurity skills.

In this course, you will learn key terminologies, and explore the current threat landscape in this comprehensive Cybersecurity Foundations.