Get in Touch

Course Outline

Foundations of Cybersecurity

  • Identify the essential skills and knowledge required to become a cybersecurity analyst.

  • Determine how security breaches affect business operations.

  • Articulate security ethics.

  • Recognize common tools employed by cybersecurity analysts.

Play It Safe: Manage Security Risks

  • Identify the main threats, risks, and vulnerabilities facing business operations.

  • Examine how organizations leverage security frameworks and controls to protect business activities.

  • Define commonly used Security Information and Event Management (SIEM) tools.

  • Utilize playbooks to respond to threats, risks, and vulnerabilities.

Connect and Protect: Networks and Network Security

  • Define various types of networks and their components.

  • Illustrate how data is transmitted and received across a network.

  • Understand methods for securing networks against intrusion tactics.

  • Describe system hardening techniques.

Tools of the Trade: Linux and SQL

  • Explain the relationship between operating systems, applications, and hardware.

  • Compare a graphical user interface with a command line interface.

  • Navigate and manage the file system using Linux commands via the Bash shell.

  • Use SQL to retrieve information from a database.

Assets, Threats, and Vulnerabilities

  • Classify assets.

  • Analyze an attack surface to identify risks and vulnerabilities.

  • Identify threats such as social engineering, malware, and web-based exploits.

  • Summarize the threat modeling process.

Sound the Alarm: Detection and Response

  • Identify the steps necessary to contain, eradicate, and recover from an incident.

  • Analyze packets to interpret network communications.

  • Understand basic syntax, signature components, and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools.

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate events.

Automate Cybersecurity Tasks with Python

  • Explain how the Python programming language is applied in cybersecurity.

  • Create new, user-defined Python functions.

  • Use regular expressions to extract information from text.

  • Practice debugging code.

Put It to Work: Prepare for Cybersecurity Jobs

  • Determine when and how to escalate a security incident.

  • Engage with the cybersecurity community.

  • Find and apply for cybersecurity jobs.

  • Prepare for job interviews.

Requirements

  • No degree or prior experience is required.
 35 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories