Cyber Security Fundamentals

Current Status
Not Enrolled
Price
Free
Get Started

Course Summary

There are a ton of motivations to seek after a vocation in cybersecurity. No matter how you look at it, cybersecurity jobs offer serious compensation, development opportunity, job stability, exciting day-to-day tasks, and the opportunity to make a difference. Forbes gauges that there will be the many as 3.5 million unfilled positions in the business worldwide by 2021! One position with an extreme shortage of skills is as a junior cybersecurity analyst.

In this introduction to Cybersecurity, you will be given a broad outline of the different part of cybersecurity. You will learn cybersecurity concepts, system, network infrastructure vulnerabilities, types of cyber-attacks and tools that are used in taking care of issues in the computing security domains. You will also gain knowledge around important topics such as cryptography, endpoint security response, detection and monitoring systems, and digital forensics. This offering is part of the SMARTlearning Cybersecurity Masterclass program that prepares student to enter and advance in the field of Cybersecurity.

Learning Outcomes

  • Discuss the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security failures.
  • Critique and evaluate the strengths and weaknesses of general cybersecurity models, including the CIA triad, access management, incident response and common security best practise
  • Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people.
  • Assess how all domains of security interact to achieve effective system-wide security at the enterprise level.
  • Identify key cybersecurity tools which include the following: anti-virus, firewall, cryptography, vulnerability management, penetration testing and digital forensics.
  • Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security domains (IT, physical, classification, personnel, and so on).
  • Assess the role of strategy and policy in determining the success of information security.
  • Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans.

Ideal Candidate

  • Junior Cyber Security Analyst
  • Junior Network Administrator or IT technician

 Related Courses

  • Cyber Security Risk Management
  • Systems & Network Administration
  • Cyber Security Essential

 

Scroll to Top