- Analyze web app risks and identify access management needs.
- List supply-chain cyber threats and plan risk mitigation.
- Implement policies and practices for cyber resilience.
- Describe ways to transition into a cybersecurity career.
Overview
Explore the dynamic cybersecurity landscape. Learn about key concepts, including vulnerabilities, threats, and the OWASP Top 10 security standard. Find out about identity and access management, supply chain risks, essential policies and resources, cyber resilience practices, and safeguarding digital assets. Plus, get guidance on transitioning to a career in cybersecurity.
Syllabus
Courses under this program:
Course 1: The Cybersecurity Threat Landscape
-Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Course 2: Learning the OWASP Top 10
-Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).
Course 3: Introduction to Identity and Access Management
-Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
Course 4: Supply Chain Cybersecurity: Preventing Supply Chain Attacks
-Explore security frameworks and practical strategies to prevent supply chain attacks on your organization.
Course 5: Cybersecurity: Key Policies and Resources
-Learn about cybersecurity policies, related resources, and how cybersecurity fits in with public policies and laws.
Course 6: Cyber Resilience: An Overview
-Learn about the concept of cyber resilience as a cybersecurity program and prepare for the latest threats in the rapidly evolving threat landscape.
Course 7: Transitioning to a Career in Cybersecurity
-Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.
Course 1: The Cybersecurity Threat Landscape
-Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Course 2: Learning the OWASP Top 10
-Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).
Course 3: Introduction to Identity and Access Management
-Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
Course 4: Supply Chain Cybersecurity: Preventing Supply Chain Attacks
-Explore security frameworks and practical strategies to prevent supply chain attacks on your organization.
Course 5: Cybersecurity: Key Policies and Resources
-Learn about cybersecurity policies, related resources, and how cybersecurity fits in with public policies and laws.
Course 6: Cyber Resilience: An Overview
-Learn about the concept of cyber resilience as a cybersecurity program and prepare for the latest threats in the rapidly evolving threat landscape.
Course 7: Transitioning to a Career in Cybersecurity
-Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.
Courses
-
Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).
-
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
-
Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.
-
Learn about cybersecurity policies, related resources, and how cybersecurity fits in with public policies and laws.
-
Explore security frameworks and practical strategies to prevent supply chain attacks on your organization.
-
Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
-
Learn about the concept of cyber resilience as a cybersecurity program and prepare for the latest threats in the rapidly evolving threat landscape.
Taught by
Marc Menninger, CISSP, CRISC, Caroline Wong, Mandy Huth, CISSP, CIPT, QTE, Nicole Dove, Gregory Michaelidis and Tia (Yatia) Hopkins