- Module 1: Describe basic cybersecurity threats, attacks, and mitigations
- Define what is cybersecurity
- Describe the basic threat landscape
- Describe different types of Malware
- Describe basic mitigation strategies
- Module 2: Describe concepts of cryptography
- Describe some of the basic concepts of cryptography
- Describe encryption and is uses in cybersecurity
- Describe hashing and digital signing
- Describe the concept and use of digital certificates
- Module 3: Describe authentication and authorization in cybersecurity
- Define authentication
- Describe common authentication-based attacks
- Describe authorization security techniques
- Module 4: Describe basic networking concepts and how they relate to cybersecurity
- Describe the basics of networks
- Describe the threats to network security
- Describe ways to protect your network
- Describe ways to securely connect to and communicate over a network
- Module 5: Describe device-based threats and security controls
- Describe what your device knows about you
- Describe how devices and become cybersecurity threats
- Describe how to mitigate against device-related threats
- Module 6: Describe application-based threats and security controls
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
After completing this module, you will be able to:
After completing this module, you will be able to:
After completing this module, you will be able to: