Course Outline
Foundations of Cybersecurity
-
Identify the essential skills and knowledge required to work as a cybersecurity analyst
-
Understand how security breaches affect business operations
-
Explain principles of security ethics
-
Recognize common tools utilized by cybersecurity analysts
Play It Safe: Manage Security Risks
-
Identify primary threats, risks, and vulnerabilities impacting business operations
-
Examine how organizations apply security frameworks and controls to protect operations
-
Define widely used Security Information and Event Management (SIEM) tools
-
Utilize a playbook to address threats, risks, and vulnerabilities
Connect and Protect: Networks and Network Security
-
Define various network types and their components
-
Illustrate how data is transmitted and received across networks
-
Understand methods to secure networks against intrusion tactics
-
Describe system hardening techniques
Tools of the Trade: Linux and SQL
-
Explain the relationship between operating systems, applications, and hardware
-
Compare a graphical user interface with a command line interface
-
Navigate and manage the file system using Linux commands via the Bash shell
-
Use SQL to retrieve information from databases
Assets, Threats, and Vulnerabilities
-
Classify assets
-
Analyze an attack surface to uncover risks and vulnerabilities
-
Identify threats such as social engineering, malware, and web-based exploits
-
Summarize the threat modeling process
Sound the Alarm: Detection and Response
-
Identify the steps necessary to contain, eradicate, and recover from an incident
-
Analyze packets to interpret network communications
-
Understand basic syntax, signatures, and logs components in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
-
Execute queries in Security Information and Event Management (SIEM) tools to investigate events
Automate Cybersecurity Tasks with Python
-
Explain how the Python programming language is applied in cybersecurity
-
Create new, user-defined Python functions
-
Use regular expressions to extract information from text
-
Practice debugging code
Put It to Work: Prepare for Cybersecurity Jobs
-
Determine when and how to escalate a security incident
-
Engage with the cybersecurity community
-
Find and apply for cybersecurity jobs
-
Prepare for job interviews
Requirements
- No degree or experience required.
Testimonials (3)
The final day which is the Machine Learning Topic
John Erick Baltazar - Globe Telecom
Course - Google BigQuery
It was a really good training course, well prepared and explained by the trainer with great hands on experience on GCP.
Mircea
Course - Google Cloud Platform Basics and Management
Responses with solutions and practical use.