Cybersecurity
Begin your journey to become a global security expert.
In this course, you will be introduced to strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats,
design and operate secure computing and networking environments, assess and audit the organization’s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur.
The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.
Browse Through Course Content
Module 1
Learn about Concepts and Definitions, Difference between IT Security, Information Security, and Cyber Security, Assets, Threats & Vulnerabilities, Cyber Security Strategy. and lots more.
Module 2
Learn about the key role of Security Architecture, Security Architecture Frameworks, Security Architecture Design Principle, Service Models, Cryptography, Implementing Security, and so on.
Module 3
Learn about Business Continuity Planning, Disaster Recovery Planning, Testing and Maintenance of the BCP/DRP, Security Assurance, Vulnerability Assessments and Penetration Testing & Minimum Security Baseline
Module 4
Learn about Business Continuity Planning, Disaster Recovery Planning, Testing and Maintenance of the BCP/DRP, Security Assurance, Vulnerability Assessments and Penetration Testing & Minimum Security Baseline
Here Are What YOU WILL LEARN
How to assess information security risk in computing and network environments.
How to create an information assurance lifecycle process.
How to analyze threats to computing and network environments.
How to design secure computing and network environments.
How to operate secure computing and network environments.
How to audit secure computing and network environments.
How to assess the security posture within a risk management framework.
How to collect cybersecurity intelligence information.
How to analyze collected intelligence to define actionable response.
How to respond to cybersecurity incidents.
How to investigate cybersecurity incidents.
How to investigate cybersecurity incidents.
YOU ARE ELIGIBLE TO
Attend If,
You need a robust introduction to Cyber Security
You plan to work in a position that requires cybersecurity knowledge
You want to start a career in Information / Cybersecurity
You are an IT professional wanting to transition your career into Cyber Security
You have Information/Cybersecurity responsibilities.