Cybersecurity Foundations
Offered By: LinkedIn Learning
Course Description
Overview
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Syllabus
Introduction
- Understanding the cybersecurity frameworks and standards
- What you should know
- Understanding the Cyber Kill Chain
- Pre-cyber threats
- The emergence of the cyber threats
- Botnets and the cybercrime industry
- Cloaking and alternate data streams
- Hiding using processes
- Controlling the target through a rootkit
- Phishing and watering holes
- Understanding advanced persistent threats
- Ransomware: A modern form of extortion
- Cryptomining
- Hardware implants and other cyber FUD
- The Orange Book: Early concepts in computer security
- Understanding the NIST Cybersecurity Framework
- Adopting the NIST Cybersecurity Framework
- Understanding the basics of cyber risk
- Analyzing cyber threats and controls
- Recording, reporting, and the risk context
- An advanced risk framework
- Managing security with COBIT
- COBIT for operational security
- Introduction to cybersecurity controls
- Cybersecurity control framework
- Cybersecurity standards of good practice
- Architecting for security
- Protecting payment card data
- Clouding the issues
- Securing things on the internet
- Ensuring security is effective
- Incident management basics
- Measuring incident management maturity
- Detecting an attack
- Hunting for threats
- Responding to an incident
- Communications plan and notification
- Cybersecurity goes global
- Understanding cyber norms
- Cybil and the Global Forum on Cyber Expertise
- The Traffic Light Protocol
- What's next
Taught by
Malcolm Shore
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity