Course Overview:
“Introduction to Cybersecurity Fundamentals” is a concise yet comprehensive course designed to provide participants with a solid understanding of the essential principles and practices in the field of cybersecurity. In just 90 minutes, learners will embark on a journey into the world of cybersecurity, learning to think like hackers and developing strategies to protect data and networks. Through engaging lessons and demonstrations, this course will empower participants with the knowledge needed to defend against common cyber threats and instill best practices for safeguarding data and privacy.
To enroll in this course, participants should have a basic familiarity with computers and their use as part of a network. While no prior cybersecurity knowledge is required, a general understanding of computing concepts will be beneficial. Participants should also come with a willingness to learn and an eagerness to explore the critical world of cybersecurity. This course serves as an excellent starting point for those interested in building a career in cybersecurity or those who want to bolster their cybersecurity knowledge to better protect themselves and their organizations from the ever-evolving landscape of cyber threats.
Curriculum
- 21 Sections
- 0 Lessons
- 6 Weeks
- Meet Your Instructor0
- Getting Started: Defining Cybersecurity0
- Reviewing The Security Model: Authentication0
- Your Data Online: Confidentiality, Integrity, & Availability0
- Key Concepts: Authorization & Non-Repudiation0
- Top 4: The Most Common Cyber Attacks0
- The Psychology Behind Cyber Attacks0
- Playing Defense Through Risk Mitigation0
- Going Beyond Traditional Passwords0
- Three Key Elements For Authentication0
- Vulnerability Alert: Email Spoofing0
- Top 6: Keys For Securing Your Emails At Work0
- Identifying Different Types Of Data0
- Protecting Data Through Encryption0
- Protecting Data Through Deletion (Part 1)0
- Protecting Data Through Deletion (Part 2)0
- The Framework Of IR0
- The Early Steps Of The IR Process0
- The Final Steps of the IR Process0
- Conclusion & Takeaways0
- Documentation and Reporting0