*** Proof of Product ***
Exploring the Essential Features of “Cyberation Academy – Cyber Defense Fundamentals”
Cyber Defense Fundamentals
Find out whether you have what it takes to join the army of enterprise defenders
Overview
Getting into the field of cyber security for most people can be quite daunting because resources that map out a clear path are very scarce. There are quite a lot of free resources and paid courses out there, but if care is not taken, youβre more likely to end up a lot more confused than enlightened after using them. Following completion of this course in just under 3 hours, you should be able to come to an informed decision point with regards to your cyber security career aspiration.
Course description
This course teaches basic knowledge of cyber security in relation to the goals of security practitioners and cyber adversaries. Additionally, students will get to discover the cyber security profession by getting answers to some of the most common questions that individuals seeking to break into the field usually ask. They will also learn about the NICE cybersecurity workforce framework while gaining an insight to key considerations that should aid their professional certification choices. The cyber security career decision tree lecture is an important one that should help students visualize and determine the possible paths that lead to where they want to be in the field of cyber security. Students will also gain basic knowledge of cyber threats, threat actors, vulnerabilities, common avenues of cyber attacks, and the role that vulnerability plays in the cyber kill chain framework. In the final section of this course, they will learn about possible negative outcomes of a cyber attack, which will help them understand the negative impact of cyber attacks on the four cyber breach case studies covered in the course.
Prerequisite
Basic knowledge of how computers and the Internet work
Who can take this course?
- Aspiring cyber security professionals
- IT Professionals who are considering a career switch
- Non-IT professionals who fancy a cyber security career
- Anyone seeking to have foundational knowledge of cyber defense
This course includes
- approximately 3 hours of on-demand video
- downloadable resources
- Quiz
Key Learning Objectives
At the end of this course, learners will be able to:
- Define cyber security and discuss it in terms of what cyber adversaries and enterprise defenders are always aiming to accomplishΒ
- Decide whether a cyber security career is for them following understanding of key considerations and common myths
- Discuss the NICE cybersecurity workforce framework in terms of cyber security work roles
- Make informed decision about cyber security certifications to pursue
- Understand the categories of actions and investments that contribute to cyber defense
- Have a clear understanding their cyber security career path based on their interests, abilities and current circumstances
- Recall and recognize sources of very useful cyber security resources and study materials
- Discuss cyber threats in general and common types of threats and threat actors
- Discuss vulnerabilities in general and the vulnerability management lifecycle
- Demonstrate an understanding of how an enterprise defender can win against cyber adversaries through effective vulnerability management
- Discuss common avenues of cyber attacks while demonstrating basic knowledge of four cyber defense domains in terms of tools and techniques typically used to protect organizational systems
- Discuss different reasons why organizations should take cyber defense seriously in relation to the possible negative outcomes of a cyber attack
- Discuss four high profile cyber security incidents in terms of what happened, why they happened, how they happened and what could have been done to prevent them
Course Curriculum
INTRODUCTION
Meet the Instructor(1:33)
Getting Your Digital Badge(1:22)
Course Overview(4:01)
DISCOVERING THE CYBER SECURITY CAREER
Learning Objectives(1:21)
What is Cyber Security?(3:16)
Cyber Security – Good and Bad Outcomes(5:48)
So You Want to get into Cyber Security?(6:19)
Dispelling Cyber Security Career Myths – Part 1(7:25)
Dispelling Cyber Security Career Myths – Part 2(4:20)
The NICE Cybersecurity Workforce Framework(3:44)
Professional Certifications(7:06)
Sliding Scale of Cyber Security(3:38)
Cyber Security Career Decision Tree(8:24)
Continuous Learning(3:32)
Quiz
DEFENDING THE ENTERPRISE
Overview of Cyber Threats(7:38)
Overview of Cyber Threats – Part 2(7:30)
Overview of Vulnerabilities(5:19)
Overview of Vulnerabilities – Part 2(6:52)
Vulnerability and The Cyber Kill Chain(8:48)
Common Avenues of Cyber Attack(5:46)
Application Security(8:43)
Data Security – Part 1(6:13)
Data Security – Part 2(9:12)
Endpoint Security(7:20)
Network Security(6:41)
Quiz
LESSONS LEARNED FROM FOUR HIGH PROFILE DATA BREACHES
Possible Negative Outcomes of a Cyber Attack(4:13)
Case Study 1 – American Medical Collection Agency (AMCA)(5:29)
Case Study 2 – Capital One Bank(3:36)
Case Study 3 – Maersk(4:58)
Case Study 4 – Equifax(4:58)
Summary
Course Roundup – Key Takeaways(5:09)
Please see the full list of alternative group-buy courses available here: https://lunacourse.com/shop/