Online Class: Cybersecurity 101
-
15Lessons
-
31Exams &
Assignments -
4,572Students
have taken this course -
6Hours
average time -
0.6CEUs
-
Video Audit
Available
Course Description
Cybersecurity Fundamentals: Safeguarding the Digital Frontier
In an era where the digital realm is deeply intertwined with our daily lives, the value of robust cybersecurity cannot be overstated. It stands as the fortress between our invaluable data and the incessant tide of cyber threats, ensuring the sanctity of our digital identities, assets, and the very fabric of our businesses. It's not just about defending from threats—it's about building a resilient, agile digital world.
Welcome to our comprehensive course on cybersecurity fundamentals—a meticulously designed portal to the world of digital safeguarding. Perfect for novices with an eagerness to delve into the realm of cybersecurity, this course offers a holistic exploration of the field, setting you on the path of becoming a sought-after professional in an ever-evolving industry.
Dive into a plethora of topics that will arm you with the knowledge you need:
- The Digital Blueprint: Understand the intricate hardware underpinning computer networks and the nuances of network design.
- Communication Codex: Master the essence of TCP/IP, get acquainted with common TCP protocols, and grasp the significance of port numbers.
- Wireless Wisdom: Equip yourself with best practices for securing wireless networks and ensuring the safety of remote users.
- Subnet Savvy: Demystify the realm of subnetting and the principles of network administration.
- Threat Landscape: From cyberattacks to wireless breaches, application onslaughts to injection attacks—know your enemy, their tactics, and their weaknesses.
- Social Engineering: Unmask the deceptive world of phishing and its kin, learning how to spot and stop these cunning threats.
- Test & Triumph: Understand the intricacies of penetration testing, vulnerability assessment, and refine your defense mechanisms.
- Crypto Corner: Embark on the cryptic journey of encryption and cryptography, the coded guardians of our data.
Unlike traditional courses, we ensure a seamless learning experience, free from the hassles of acquiring special software or equipment. While our primary objective isn't to prime you for specific certification exams, we lay a solid foundation upon which you can build, be it for further advanced studies or kickstarting a rewarding career in this crucial domain.
Enroll today and embark on a riveting journey to decipher, defend, and dominate the cyber realm. With every module, you'll be one step closer to becoming the vanguard of the digital world. Join us and be a beacon of security in the vast expanse of cyberspace.
Course Lessons
Lesson 1: Introduction to Cybersecurity
This course was created to train anyone interested in pursuing a career in cybersecurity. It was designed for beginners. Anyone who has used computers or the internet to surf websites and explore social media, as well as check and receive email will be able to understand and complete the course. No previous experience or knowledge is required.Lesson 2: Basic Network Security
In this lesson, we are going to learn about firewalls, proxies, and switches, as well as a few other elements important to protecting a network.Lesson 3: The Principles of Network Administration
In this lesson, we are going to discuss the basic tasks of network administration within a larger company. We will continue to learn more about firewalls, routers, and switches, and learn why the configuration of hardware and software used to secure a network is so important.Lesson 4: Understanding TCP/IP and Wireless Networks
In this lesson, we are going to learn about TCP and IP and how they relate to cybersecurity.Lesson 5: Risk Mitigation
It is important to create policies that reduce the risk to your organization. Policies are lists of rules. Procedures are put into place based on the policies. If the procedures are followed, the rules will be followed and the policies upheld.Lesson 6: Security Risks Associated with Integrating Systems
In today's world, there are more than a few social media platforms. Twitter and Facebook are perhaps the most popular. It is critical that your company controls the information that is shared on these social networks to make sure private or sensitive data is not shared or leaked.Lesson 7: Basic Incident Response and Forensics
In this lesson, we will talk about how to prepare for and respond to incidents. We will also discuss basic forensic procedures used to preserve evidence.Lesson 8: The Importance of Security Training
Staff needs to be trained so they know how to handle any security issue that arises, even if they do not think of it as a security issue. It is especially important to train them on how to handle personally identifiable information such as social security numbers, credit card numbers, or addresses. Training is critical so they do not disclose that information to unauthorized users.Lesson 9: Malware and Cyber Attacks
Malware is any malicous program that is installed in a server or machine. They are several types of malware but for the purpose of this course, we are going to start out by discussing some of the basic types.Lesson 10: Cyber Attacks and Mitigation Techniques
We are going to continue talking about different types of cyber attacks in this lesson, as well as give you some mitigation and deterrent techniques to help prevent some attacks.Lesson 11: Addressing Security Vulnerabilities in a Network
A vulnerability is defined as a weak spot in your network that could be exploited by a threat such as an attacker. If a security team does not take the time to identify and fix vulnerabilities in a network, then that network becomes open to data loss, data theft, corruption, and downtime.Lesson 12: Network Application and Client-Side Security Techniques
This lesson focuses on security techniques for both applications, clients, and hardware.Lesson 13: Information and Data Security
It is not enough to use and configure the proper network devices, controls, anti-virus, anti-spyware, etc. We must also take steps to protect the data by taking measures to secure it just as diligently as we secure everything else on the network.Lesson 14: Authentication and Access Services and Controls
Authentication is the process of keying in a username and password to access a network or its data. There are several types of authentication services out there but all share the same purpose.Lesson 15: Encryption and Cryptography
Encryption is the process in which data is converted into a code to prevent it from being eavesdropped on by unauthorized users or attackers. It is used to guarantee the confidentiality and integrity of data. Cryptography is the process of writing these encryption codes. You can also say that cryptography is the process of converting plain text into ciphertext.
Learning Outcomes
- Describe what cybersecurity means what why it is important.
- Describe basic network security.
- Summarize principles of network administration.
- Describe risk mitigation.
- Summarize security risks associated with integrating systems.
- Determine basic incident response and forensics.
- Describe the importance of security training.
- Describe malware and cyber attacks.
- Describe cyber attacks and mitigation techniques.
- Summarize addressing security vulnerabilities in a network.
- Describe authentication and access services and controls.
- Summarize encryption and cryptography techniques and best practices.
- Demonstrate mastery of lesson content at levels of 70% or higher.
Additional Course Information
- Document Your Lifelong Learning Achievements
- Earn an Official Certificate Documenting Course Hours and CEUs
- Verify Your Certificate with a Unique Serial Number Online
- View and Share Your Certificate Online or Download/Print as PDF
- Display Your Certificate on Your Resume and Promote Your Achievements Using Social Media
Student Testimonials
- "This course is fantastic! I learned a lot from it, although I know about computers, I was cybersecurity illiterate before this course." -- Gamal G.
- "This course was great. I liked the vocabulary. There were terms I have heard before but never really understood and this course clarified things for me." -- Sonny T.
- "This course has enlighten me to understand how important cyber security is, and all the pro's and con's that take part in being secure. I really enjoyed this course. Thank you." -- Phyllis J.
- "I thought the course was very informative. I learned a lot. Thank you!" -- Lisa K.
- "This course was very helpful. Learned a lot of things that I did not know." -- Cristina G.
- "A very good course overall. I knew a lot before the course but definitely learned some new stuff." -- Benny M.
- "As a beginner in this domain of activity, I found this course easy to understand and very helpful." -- Gabriel C.
- "I like the course. I have a better understanding of cyber security." -- Danil L.
- "i enjoyed this class very much." -- Cristina G.
Related Courses
- 5 hours 0.5 CEUs Microsoft Outlook Level 1 + More Info
- 12 hours 1.2 CEUs Microsoft Excel Level 1 + More Info
- 7 hours 0.7 CEUs Microsoft Word Level 1 + More Info
- 8 hours 0.8 CEUs Quicken Tutorial: All Versions + More Info
- 8 hours 0.8 CEUs Microsoft PowerPoint Level 1 + More Info
- 12 hours 1.2 CEUs Adobe Photoshop + More Info
- 7 hours 0.7 CEUs Google Slides + More Info
- 6 hours 0.6 CEUs Microsoft Publisher Level 1 + More Info
- 7 hours 0.7 CEUs Microsoft Excel Level 3 + More Info
- 14 hours 1.4 CEUs QuickBooks 101 + More Info
- 8 hours 0.8 CEUs MySQL + More Info
- 6 hours 0.6 CEUs Google Docs + More Info
- 7 hours 0.7 CEUs Google Sheets + More Info
- 14 hours 1.4 CEUs QuickBooks Online + More Info
- 20 hours 2.0 CEUs Photoshop Elements 101 + More Info
- 7 hours 0.7 CEUs Personal Communication Skills Level 4 + More Info
- 9 hours 0.9 CEUs Microsoft Project Level 1 + More Info
- 5 hours 0.5 CEUs Developing Great Social Skills + More Info
- 8 hours 0.8 CEUs Microsoft Access Level 1 + More Info
- 7 hours 0.7 CEUs Microsoft Excel Level 2 + More Info
- 17 hours 1.7 CEUs Introduction to SQL + More Info
- 11 hours 1.1 CEUs Introduction to CSS + More Info
- 8 hours 0.8 CEUs Learn HTML - Create Webpages Using HTML5 + More Info