Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will explore security concepts to ensure that a solid foundation is laid for future knowledge.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Exploring Security Concepts, you’ll learn the some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore common cybersecurity terminology and how it’s used within organizations. Next, you’ll learn about cybersecurity components and concepts, as well as pieces within your network that serve to provide different aspects of security in the organization. Finally, you’ll discover how to identify cybersecurity problems and how to isolate compromised hosts using logging. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Exploring Security Concepts, you’ll learn the some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore common cybersecurity terminology and how it’s used within organizations. Next, you’ll learn about cybersecurity components and concepts, as well as pieces within your network that serve to provide different aspects of security in the organization. Finally, you’ll discover how to identify cybersecurity problems and how to isolate compromised hosts using logging. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.