Cybersecurity Foundations
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
After completing this course you should be able to:
Increase your awareness of security
Interpret/analyze tool output for network mapping/footprinting
Reduce attack surface of systems
Review networking as it applies to security controls
Explore different data protection principles
Examine the role of PKI/certificates in building trusted relationships between devices in a network
Implement login security and other identity management solutions
Reduce attack surface of network devices
Explore current malware threats and anti-malware solutions
Explore social engineering threats, methods, and techniques
Examine software vulnerabilities and security solutions for reducing the risk of exploitation
Explain monitoring capabilities and requirements and how those may raise privacy concerns
Identify physical security controls and the relationship between physical and IT security
Explain incident response capabilities
Identify legal considerations and investigative techniques when it comes to cybersecurity
Research trends in cybersecurity