Course Description
Step into the role of a Digital Guardian! This course equips you with essential cybersecurity tools and skills to safeguard yourself and your organization in today’s fast-paced digital landscape.Â
Learn how to identify online risks, defend against cyber threats, and protect valuable assets like personal information and sensitive data. Whether you’re a student, a professional, or simply someone who wants to stay safe online, this course will empower you to navigate the virtual world confidently.Â
If you're looking to join a dynamic and rewarding workforce, get Certified in Cybersecurity and demonstrate to employers you have the foundational knowledge and passion to join their team.
This course is ideal for:
- IT professionals
- Career changers looking to transition into cybersecurity
- College students or recent graduates
Ideal candidates are:
- Problem solvers
- Creative
- Analytical and critical thinkers
- Excited by the opportunity to learn
Curriculum
Available in
days
days
after you enroll
- Introduction (2:33)
- Teaching Approach (2:41)
- Curriculum Overview (2:53)
- CIA Triad (20:33)
- Authentication (17:27)
- Risk Management (4:46)
- Risk Management Terminology (7:01)
- Risk Management Deep Dive (5:39)
- Managing Risks in Our Daily Lives (6:30)
- Making Decisions Based on Risk Priorities (5:45)
- How Risk Management Helps Identifying Risks (7:14)
- Risk Assessment (12:22)
- Risk Tolerance (16:17)
- Risk Priority (12:30)
- Risk Treatment (9:54)
- Governance (15:03)
- Security controls (9:09)
- Privacy (5:29)
- Ethical Dilemmas in Cybersecurity (8:45)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Security and Access Control Concepts (3:57)
- Understanding Access Control Concepts (6:52)
- Control Assessments (5:06)
- Defense In Depth (11:48)
- Least Privilege (5:38)
- Privileged Access Management (8:38)
- Privileged Account (7:45)
- Separation of Duties (5:26)
- Authorized Versus Unauthorized Personnel (7:50)
- The Benefit Of Multiple Controls (7:35)
- Logical Access Controls (6:11)
- Controls and Risks (7:04)
- Role-Based Access Control (RBAC) (8:04)
- Monitoring (7:04)
- Physical Security Controls (5:29)
- Examples of Physical Access Controls (8:17)
- Discretionary Access Control (DAC) (8:26)
- Mandatory Access Control (MAC) (8:12)
Available in
days
days
after you enroll
- Networking
- Networking Models (OSI, TCP/IP)
- Security Of the Network
- Cyber Threats
- Intrusion Detection System (IDS)
- Microsegmentation
- On-Premises Data Centers
- Cloud Computing
- Network Segmentation: Demilitarized Zone (DMZ)
- Virtual Private Network (VPN)
- Managed Service Provider (MSP)
- Virtual Local Area Network (VLAN)
- Network Access Control (NAC)
- Zero Trust
Available in
days
days
after you enroll
Featured Products
Check your inbox to confirm your subscription