Fundamentals of Cybersecurity
Non-member Price: $335.00
Delivery Method: E-Learning
Available Now!
Overview:
Fundamentals of Cybersecurity is an introductory course designed to give you a foundational look at the complex cybersecurity landscape and the emerging field of information technology (IT) systems security and assurance. This course will help provide you with the tools to evaluate online risks and security protocols in information processing systems.
Course Content:
| 1. Course Orientation | (introductory module) |
| 2. Introduction to Cybersecurity | This module introduces the term cybersecurity. The need for a holistic and multi-level approach to securing systems and/or networks through defense of depth is also discussed as well as the financial and reputational consequences of security breaches. |
| 3. IT Governance | This module focuses on IT governance and its importance to organizations. The module also introduces COBIT 2019, an IT governance framework and how it creates value for organizations. |
| 4. IT Risk Management | This module focuses on IT risk management, its importance, IT risk management concepts, and the steps involved in a risk management process. |
|
5. Incident Response and Disaster Recovery |
This module focuses on incident response and recovery from IT disasters. While cybersecurity incident response focuses on events that impact computer systems and personal information, disaster recovery tends to focus on larger, organization-wide events, such as earthquakes, hurricanes, and terrorism. The goal of both incident response and disaster recovery is to recover from an adverse event. |
| 6. Basic Network Concepts | This module focuses on the basic network concepts. You will be able to identify a network and its characteristics based on size, location, and purpose. |
| 7. Network Security | This module focuses on network security. You learn how network security is defined and the importance of the cybersecurity professional’s technical skills. You will learn some of the top cyber attacks that have compromised network security and examine various network devices, controls, and methods to secure a network. Lastly, you will learn some of the basics about network vulnerabilities. |
|
8. Types of Cyberattacks and Protection |
This module focuses on cyber attacks: malicious acts by persons, groups or organizations, for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure or for destroying data or stealing confidential information. After completing the module, you should be able to identify the common impacts of cyber attacks, motivations of adversaries, as well as who the cyber attackers are. This module also provides basic tips on how to protect yourself and your company against cyber attacks. |
| 9. Operations Security | This module focuses on four aspects of operations security: What it is, the administrative controls, the physical controls, and the best practices in storing, retaining, and destroying sensitive data. |
| 10. IT Law and Ethics | This module focuses on legal and ethical considerations pertinent to information system security and assurance professionals. You learn how complicated cybersecurity law enforcement is, what types of intellectual property are targeted by hackers, the different laws around IT security, and the four canons of the (ISC)2Code of Ethics. |
Learning Objectives:
Upon completing this course, you should be able to:
- Identify career opportunities and salary ranges related to a career in cybersecurity or assurance
- Detect common cyber attacks that exploit system (software) and human vulnerabilities
- Identify practical tips to protect you from cyber attacks (system and human vulnerabilities)
- Identify some tools and techniques associated with cybersecurity “defence in depth”
- Recognize the financial and/or reputational consequences of major security breaches
- Identify strategies to protect against and respond to ransomware and denial of service attacks
- Detect actors and motivations for cyber attacks
- Identify the consequences of cyber attacks for organizations
- Define threat, vulnerability, impact, risk, and control within the IT context
- Recognize the importance of incident response and disaster recovery for organizations
- Recognize best practices for safely storing, retaining, and destroying sensitive data
- Recognize some important laws, regulations, and legal principles that affect IT security
Who Will Benefit:
Individuals looking to increase their knowledge in the fundamentals of cybersecurity. The demand for cybersecurity knowledge is on the rise across all types of industries. Learn the unique ability to protect and secure digital assets in one of the fastest growing technology fields in the world.
Non-member Price: $335.00
Delivery Method: E-Learning
Available Now!