Get in Touch

Course Outline

Foundations of Cybersecurity

  • Recognize the core skills and knowledge needed to become a cybersecurity analyst.

  • Identify how security attacks impact business operations.

  • Explain the principles of security ethics.

  • Identify the common tools used by cybersecurity analysts.

Play It Safe: Manage Security Risks

  • Identify the primary threats, risks, and vulnerabilities affecting business operations.

  • Examine how organizations use security frameworks and controls to safeguard business operations.

  • Define commonly used Security Information and Event Management (SIEM) tools.

  • Use a playbook to respond effectively to threats, risks, and vulnerabilities.

Connect and Protect: Networks and Network Security

  • Define the types of networks and their key components.

  • Illustrate how data is transmitted and received across a network.

  • Understand how to secure a network against intrusion tactics.

  • Describe system hardening techniques.

Tools of the Trade: Linux and SQL

  • Explain the relationship between operating systems, applications, and hardware.

  • Compare a graphical user interface to a command line interface.

  • Navigate and manage the file system using Linux commands via the Bash shell.

  • Use SQL to retrieve information from a database.

Assets, Threats, and Vulnerabilities

  • Classify assets.

  • Analyze an attack surface to identify risks and vulnerabilities.

  • Identify threats such as social engineering, malware, and web-based exploits.

  • Summarize the threat modeling process.

Sound the Alarm: Detection and Response

  • Identify the steps to contain, eradicate, and recover from a security incident.

  • Analyze packets to interpret network communications.

  • Understand basic syntax, signature components, and log structures in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools.

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate events.

Automate Cybersecurity Tasks with Python

  • Explain how the Python programming language is applied in cybersecurity.

  • Create new, user-defined Python functions.

  • Use regular expressions to extract information from text.

  • Practice debugging code.

Put It to Work: Prepare for Cybersecurity Jobs

  • Determine when and how to escalate a security incident.

  • Engage with the cybersecurity community.

  • Find and apply for cybersecurity jobs.

  • Prepare for job interviews.

Requirements

  • No degree or prior experience required.
 35 Hours

Testimonials (3)

Related Categories