Introduction to Cybersecurity
Concepts Covered: Threat Assessment, Security Vulnerabilities, Compliance, Governance, Risk, Incident Response
Build expertise in security analysis, security engineering, enterprise security, security architecture, ethical hacking, and data privacy. With the skills you learn in our cybersecurity courses, you can launch or advance a successful career in the field. Start acquiring valuable expertise right away, create a project portfolio to demonstrate your abilities, and get support from mentors, peers, and experts in the field.
Concepts Covered: Threat Assessment, Security Vulnerabilities, Compliance, Governance, Risk, Incident Response
Concepts Covered: Vulnerability Management, Penetration Testing, Reconnaissance, Social Engineering, Open-Source Intelligence, System and Application Auditing
Concepts Covered: Threat Modeling, DiD Framework, Cybersecurity Risk Management, Incident Response Playbooks, Network Security Fundamentals, Architecture Diagramming, Access Control Matrices
Concepts Covered: Cryptography, Risk Evaluation, Authentication, Authorization, Access Management, Penetration Testing
Concepts Covered: Security Controls, Defensible Network Architecture, Security Threat Mitigation, Threat Modeling, Vulnerability Assessment, Incident Detection and Handling
Concepts Covered: Privacy Impact Assessments, Data Privacy Fundamentals, Data privacy classification, Data Privacy Governance, Data Privacy Checklists, Data Privacy Best Practices, Data Loss Prevention, Technical Cybersecurity Controls, Procedural Cybersecurity Controls, Cybersecurity Controls, NIST Cybersecurity Framework, Data Privacy Regulations
Concepts Covered: Device Hardening Strategy, Cybersecurity Policy Writing, Zero Trust Security Model, Data Encryption, Backup Strategy, API Security, Cloud Hardening Strategy, Container Vulnerability Management, IT Asset Management, Secure Network Architecture Design, Cybersecurity Compliance
Concepts Covered: Basic Cybersecurity Implementation, Threat Actors, Security Devices, Vulnerability Assessment, Security Risk Classification, Cybersecurity Fluency, Cybersecurity Risk Management, Cybersecurity Training Strategies, Social Engineering, Phishing, Cybersecurity Incident Response Playbooks, Cybersecurity Regulations and Standards
Concepts Covered: Zero Trust Pillars, Zero Trust Security Model, Zero Trust Deployment Strategy, Zero Trust Maturity Model, Zero Trust Algorithms, Cybersecurity Risk Management, Perimeter Security
Concepts Covered: Cybersecurity Implementation, Identity and Access Management, Network Security, Ethical Hacking, Data Security, Cybersecurity Resources, Standards, and Frameworks, Cybersecurity Monitoring, Cybersecurity Policy and Strategy, Cybersecurity Tools
Cybersecurity training helps learners identify, correct, and respond to security weaknesses and incidents through open-ended projects that mimic workplace security challenges. Plus, get hands-on experience monitoring network traffic, analyzing alert and log data, and following incident handling procedures.
Security Controls, Defensible Network Architecture, Security Threat Mitigation, Threat Modeling, Vulnerability Assessment, Incident Detection and Handling
Learn moreThreat Assessment, Security Vulnerabilities, Compliance, Governance, Risk, Incident Response
Learn moreCryptography, Risk Evaluation, Authentication, Authorization, Access Management, Penetration Testing
Learn moreData Wrangling, Matplotlib, Bootstrapping, Pandas, NumPy, Statistics
Learn moreWith real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.
You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.