Course Outline
Foundations of Cybersecurity
- 
	
Recognize core skills and knowledge needed to become a cybersecurity analyst
 - 
	
Identify how security attacks impact business operations
 - 
	
Explain security ethics
 - 
	
Identify common tools used by cybersecurity analysts
 
Play It Safe: Manage Security Risks
- 
	
Identify the primary threats, risks, and vulnerabilities to business operations
 - 
	
Examine how organizations use security frameworks and controls to protect business operations
 - 
	
Define commonly used Security Information and Event Management (SIEM) tools
 - 
	
Use a playbook to respond to threats, risks, and vulnerabilities
 
Connect and Protect: Networks and Network Security
- 
	
Define the types of networks and components of networks
 - 
	
Illustrate how data is sent and received over a network
 - 
	
Understand how to secure a network against intrusion tactics
 - 
	
Describe system hardening techniques
 
Tools of the Trade: Linux and SQL
- 
	
Explain the relationship between operating systems, applications, and hardware
 - 
	
Compare a graphical user interface to a command line interface
 - 
	
Navigate and manage the file system using Linux commands via the Bash shell
 - 
	
Use SQL to retrieve information from a database
 
Assets, Threats, and Vulnerabilities
- 
	
Classify assets
 - 
	
Analyze an attack surface to find risks and vulnerabilities
 - 
	
Identify threats, such as social engineering, malware and web-based exploits
 - 
	
Summarize the threat modeling process
 
Sound the Alarm: Detection and Response
- 
	
Identify the steps to contain, eradicate, and recover from an incident
 - 
	
Analyze packets to interpret network communications
 - 
	
Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
 - 
	
Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
 
Automate Cybersecurity Tasks with Python
- 
	
Explain how the Python programming language is used in cybersecurity
 - 
	
Create new, user-defined Python functions
 - 
	
Use regular expressions to extract information from text
 - 
	
Practice debugging code
 
Put It to Work: Prepare for Cybersecurity Jobs
- 
	
Determine when and how to escalate a security incident
 - 
	
Engage with the cybersecurity community
 - 
	
Find and apply for cybersecurity jobs
 - 
	
Prepare for job interviews
 
Requirements
- No degree or experience required.
 
Testimonials (1)
Responses with solutions and practical use.