Lesson 1
Welcome to Cybersecurity Fundamentals
In this lesson, you will be given an overview of the course.
Course
Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.
Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.
Cybersecurity fluency
Vulnerability management
Identity and access management fundamentals
Threat intelligence
Beginner
3 weeks
Real-world Projects
Completion Certificate
Last Updated March 16, 2023
Operating system fundamentals
Cybersecurity fluency
Lesson 1
Welcome to Cybersecurity Fundamentals
In this lesson, you will be given an overview of the course.
Lesson 2
What is Cybersecurity
In this lesson, you will learn the security trend and how to develop a career in cybersecurity.
Lesson 3
Maintain a Secure Infrastructure
In this lesson, you will learn some cybersecurity laws and some basics about security governance, compliance, and regulations.
Lesson 4
Think Like a Hacker
In this lesson, you will learn the hacking lifecycle and the basics of vulnerability, threat, and attack.
Lesson 5
Security Defenses
In this lesson, you will learn some basic methods to keep your computer and network safe.
Lesson 6
Applying Cybersecurity
In this lesson, you will practice applying cybersecurity to many situations.
Lesson 7 • Project
Project: Securing a Business Network
In this project, you will apply the skills you have learned in this course to secure a business network.
Ron Woerner
Chief Security Officer
Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.
Ron Woerner
Chief Security Officer
Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.
Get Started Today