Course Syllabus
Lesson 1 – Course Introduction
0.1 Course Introduction
Lesson 2 – Cybersecurity Fundamentals
1.1 Introduction
1.2 Fundamentals of Cybersecurity
1.3 Threat Actors, Attacks, and Mitigation
1.4 Security Policies and Procedures
1.5 Cybersecurity Mitigation Methods
1.6 Key Takeaways
Lesson 3 – Enterprise Architecture and Components
2.1 Introduction
2.2 Secure Architecture
2.3 Wireless Networks
2.4 Network Security Controls
2.5 Cloud, Virtualization, BYOD, and IOT Security
2.6 Security Testing
2.7 Key Takeaways
Lesson 4 – Information System Governance and Risk Assessment
3.1 Introduction
3.2 Information Security Governance
3.3 Risk Management
3.4 Information Security Programs
3.5 Key Takeaways
Lesson 5 – Incident Management
4.1 Introduction
4.2 Developing an Incident Management and Response System
4.3 Digital Forensics
4.4 Business Continuity and Disaster Recovery
4.5 Key Takeaways
Learn a practical skill-set in defeating all online threats, including – advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more. Become a Cyber Security Specialist – Go from a beginner to advanced in this easy to follow expert course.
Covering all major platforms – Windows 7, Windows 8, Windows 10, MacOS and Linux. This course covers the fundamental building blocks of your required skill set – You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
Learn cyber security basics with this Introduction to Cyber Security course. This course is designed for beginners to familiarize them with the current cyber security landscape and provide the knowledge of relevant tools to assess and manage security protocols in information processing systems.
Learners can also perform business impact analysis and disaster recovery testing through this program. We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.
Who this course is for:
- This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers the required foundation building blocks of that skillset.
- For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.
- This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.
- For beginners and intermediate Internet users who are interested in security, safety, and privacy.
- For those who want privacy and anonymity online from hackers, corporations and governments.
- This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity.
What you’ll learn:
- An advanced practical skillset in defeating all online threats – advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass.
-
The very latest up-to-date information and methods.
-
Start a career in cyber security. Become a cyber security specialist.
-
Explore the threat landscape – Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.
-
You will master encryption in an easy to follow crash course.
- Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines.
- A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this.
-
You will master encryption in an easy to follow crash course.
-
You will learn about nation state secret tracking and hacking infrastructure.