Course Outline
Foundations of Cybersecurity
-
Recognize the core skills and knowledge needed to become a cybersecurity analyst.
-
Identify how security attacks impact business operations.
-
Explain the principles of security ethics.
-
Identify the common tools used by cybersecurity analysts.
Play It Safe: Manage Security Risks
-
Identify the primary threats, risks, and vulnerabilities affecting business operations.
-
Examine how organizations use security frameworks and controls to safeguard business operations.
-
Define commonly used Security Information and Event Management (SIEM) tools.
-
Use a playbook to respond effectively to threats, risks, and vulnerabilities.
Connect and Protect: Networks and Network Security
-
Define the types of networks and their key components.
-
Illustrate how data is transmitted and received across a network.
-
Understand how to secure a network against intrusion tactics.
-
Describe system hardening techniques.
Tools of the Trade: Linux and SQL
-
Explain the relationship between operating systems, applications, and hardware.
-
Compare a graphical user interface to a command line interface.
-
Navigate and manage the file system using Linux commands via the Bash shell.
-
Use SQL to retrieve information from a database.
Assets, Threats, and Vulnerabilities
-
Classify assets.
-
Analyze an attack surface to identify risks and vulnerabilities.
-
Identify threats such as social engineering, malware, and web-based exploits.
-
Summarize the threat modeling process.
Sound the Alarm: Detection and Response
-
Identify the steps to contain, eradicate, and recover from a security incident.
-
Analyze packets to interpret network communications.
-
Understand basic syntax, signature components, and log structures in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools.
-
Perform queries in Security Information and Event Management (SIEM) tools to investigate events.
Automate Cybersecurity Tasks with Python
-
Explain how the Python programming language is applied in cybersecurity.
-
Create new, user-defined Python functions.
-
Use regular expressions to extract information from text.
-
Practice debugging code.
Put It to Work: Prepare for Cybersecurity Jobs
-
Determine when and how to escalate a security incident.
-
Engage with the cybersecurity community.
-
Find and apply for cybersecurity jobs.
-
Prepare for job interviews.
Requirements
- No degree or prior experience required.
Testimonials (3)
The final day which is the Machine Learning Topic
John Erick Baltazar - Globe Telecom
Course - Google BigQuery
It was a really good training course, well prepared and explained by the trainer with great hands on experience on GCP.
Mircea
Course - Google Cloud Platform Basics and Management
Responses with solutions and practical use.