Lesson 1
Introduction to Defending and Securing Systems
Course introduction to Introduction to Defending and Securing Systems
Course
In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.
In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.
Cryptography
Security information and event management
Systems security
Security assessment
Beginner
3 weeks
Real-world Projects
Completion Certificate
Last Updated March 16, 2023
Command line interface basics
Lesson 1
Introduction to Defending and Securing Systems
Course introduction to Introduction to Defending and Securing Systems
Lesson 2
Defending Computer Systems and Security Principles
In this lesson you will learn about best practices in defending computer systems.
Lesson 3
System Security: Securing Networks
In this lesson you will learn how to secure networks.
Lesson 4
Monitoring and Logging for Detection of Malicious Activity
In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity.
Lesson 5
Cryptography Basics (Applied Cryptography)
In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files.
Lesson 6 • Project
Project: Monitoring and Securing the DFI Environment
This lesson is the project lesson for Defending and Securing Systems course.
Jerry Smith
Information Security Engineer
Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.
Jerry Smith
Information Security Engineer
Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.
Get Started Today