Get in Touch

Course Outline

Foundations of Cybersecurity

  • Identify the essential skills and knowledge required to work as a cybersecurity analyst

  • Understand how security breaches affect business operations

  • Explain principles of security ethics

  • Recognize common tools utilized by cybersecurity analysts

Play It Safe: Manage Security Risks

  • Identify primary threats, risks, and vulnerabilities impacting business operations

  • Examine how organizations apply security frameworks and controls to protect operations

  • Define widely used Security Information and Event Management (SIEM) tools

  • Utilize a playbook to address threats, risks, and vulnerabilities

Connect and Protect: Networks and Network Security

  • Define various network types and their components

  • Illustrate how data is transmitted and received across networks

  • Understand methods to secure networks against intrusion tactics

  • Describe system hardening techniques

Tools of the Trade: Linux and SQL

  • Explain the relationship between operating systems, applications, and hardware

  • Compare a graphical user interface with a command line interface

  • Navigate and manage the file system using Linux commands via the Bash shell

  • Use SQL to retrieve information from databases

Assets, Threats, and Vulnerabilities

  • Classify assets

  • Analyze an attack surface to uncover risks and vulnerabilities

  • Identify threats such as social engineering, malware, and web-based exploits

  • Summarize the threat modeling process

Sound the Alarm: Detection and Response

  • Identify the steps necessary to contain, eradicate, and recover from an incident

  • Analyze packets to interpret network communications

  • Understand basic syntax, signatures, and logs components in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

  • Execute queries in Security Information and Event Management (SIEM) tools to investigate events

Automate Cybersecurity Tasks with Python

  • Explain how the Python programming language is applied in cybersecurity

  • Create new, user-defined Python functions

  • Use regular expressions to extract information from text

  • Practice debugging code

Put It to Work: Prepare for Cybersecurity Jobs

  • Determine when and how to escalate a security incident

  • Engage with the cybersecurity community

  • Find and apply for cybersecurity jobs

  • Prepare for job interviews

Requirements

  • No degree or experience required.
 35 Hours

Testimonials (3)

Upcoming Courses

Related Categories