Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Describe the basic concepts of cybersecurity

Microsoft via Microsoft Learn

Overview

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
  • After completing this module, you will be able to:

    • Define what is cybersecurity
    • Describe the basic threat landscape
    • Describe different types of Malware
    • Describe basic mitigation strategies
  • Module 2: Describe concepts of cryptography
  • After completing this module, you will be able to:

    • Describe some of the basic concepts of cryptography
    • Describe encryption and is uses in cybersecurity
    • Describe hashing and digital signing
    • Describe the concept and use of digital certificates
  • Module 3: Describe authentication and authorization in cybersecurity
  • After completing this module, you will be able to:

    • Define authentication
    • Describe common authentication-based attacks
    • Describe authorization security techniques
  • Module 4: Describe basic networking concepts and how they relate to cybersecurity
    • Describe the basics of networks
    • Describe the threats to network security
    • Describe ways to protect your network
    • Describe ways to securely connect to and communicate over a network
  • Module 5: Describe device-based threats and security controls
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device-related threats
  • Module 6: Describe application-based threats and security controls
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications

Syllabus

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
    • Introduction
    • Describe what is cybersecurity
    • Describe the threat landscape
    • Describe malware
    • Describe basic mitigation strategies
    • Knowledge check
    • Summary and resources
  • Module 2: Describe concepts of cryptography
    • Introduction
    • Describe cryptography
    • Describe encryption and its use in cybersecurity
    • Describe hashing and its application in digital signing
    • Describe digital certificates
    • Knowledge check
    • Summary and resources
  • Module 3: Describe authentication and authorization in cybersecurity
    • Introduction
    • Define authentication
    • Describe authentication-based attacks
    • Describe authorization security techniques
    • Knowledge check
    • Summary and resources
  • Module 4: Describe network-based threats and mitigations
    • Introduction
    • Describe the different types of networks
    • Describe how data moves around a network
    • Describe threats to network security
    • Protect your network
    • Knowledge check
    • Summary and resources
  • Module 5: Describe device-based threats and security controls
    • Introduction
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device related threats
    • Knowledge check
    • Summary and resources
  • Module 6: Describe application-based threats and how to protect against them
    • Introduction
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications
    • Knowledge check
    • Summary and resources

Reviews

Start your review of Describe the basic concepts of cybersecurity

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.