Course Outline

Foundations of Cybersecurity

  • Recognize core skills and knowledge needed to become a cybersecurity analyst

  • Identify how security attacks impact business operations

  • Explain security ethics

  • Identify common tools used by cybersecurity analysts

 

Play It Safe: Manage Security Risks

  • Identify the primary threats, risks, and vulnerabilities to business operations

  • Examine how organizations use security frameworks and controls to protect business operations

  • Define commonly used Security Information and Event Management (SIEM) tools

  • Use a playbook to respond to threats, risks, and vulnerabilities

 

Connect and Protect: Networks and Network Security

  • Define the types of networks and components of networks

  • Illustrate how data is sent and received over a network

  • Understand how to secure a network against intrusion tactics

  • Describe system hardening techniques

 

Tools of the Trade: Linux and SQL

  • Explain the relationship between operating systems, applications, and hardware

  • Compare a graphical user interface to a command line interface

  • Navigate and manage the file system using Linux commands via the Bash shell

  • Use SQL to retrieve information from a database

 

Assets, Threats, and Vulnerabilities

  • Classify assets

  • Analyze an attack surface to find risks and vulnerabilities

  • Identify threats, such as social engineering, malware and web-based exploits

  • Summarize the threat modeling process

 

Sound the Alarm: Detection and Response

  • Identify the steps to contain, eradicate, and recover from an incident

  • Analyze packets to interpret network communications

  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event

 

Automate Cybersecurity Tasks with Python

  • Explain how the Python programming language is used in cybersecurity

  • Create new, user-defined Python functions

  • Use regular expressions to extract information from text

  • Practice debugging code

 

Put It to Work: Prepare for Cybersecurity Jobs

  • Determine when and how to escalate a security incident

  • Engage with the cybersecurity community

  • Find and apply for cybersecurity jobs

  • Prepare for job interviews

Requirements

  • No degree or experience required.
 35 Hours

Testimonials (1)

Related Courses

Related Categories