At 10 hours/week
Get access to the classroom immediately on enrollment
In Collaboration With:
Basic knowledge of network connectivity and OS fundamentals See detailed requirements.
This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.Securing a Business Network
Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.Monitoring and Securing Douglas Financials Inc.
During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise.Navigating a Cybersecurity Incident
Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives.Create the SwiftTech GRC Program
Chief Security Officer
Ron Woerner is a noted consultant, speaker and writer in the security industry. As Chief Security Evangelist at Cyber-AAA, LLC, he delivers training and security risk assessments for small, medium, and large organizations. Ron also teaches at Bellevue University, an NSA Center of Academic Excellence.
Information Security Engineer
Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.
Founder & CEO, Cyber Pop-up
Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.
Sr. Director, Security & GRC
Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive security solutions that follow stringent security principles while accelerating business.
Impacted by COVID-19? We're offering deeper discounts. Apply and see how much.Get your discount
Start learning today! Switch to the monthly price afterwards if more time is needed.
Start Learning Today! Get maximum flexibility to learn at your own pace.