YoVDO

Cybersecurity Foundations

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Network Security Courses Risk Management Courses Incident Response Courses Ransomware Courses Data Protection Courses Phishing Courses NIST Cybersecurity Framework Courses Cyber Kill Chain Courses

Course Description

Overview

Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.

Syllabus

Introduction
  • Understanding the cybersecurity frameworks and standards
  • What you should know
1. Cyber Threats
  • Understanding the Cyber Kill Chain
  • Pre-cyber threats
  • The emergence of the cyber threats
  • Botnets and the cybercrime industry
  • Cloaking and alternate data streams
  • Hiding using processes
  • Controlling the target through a rootkit
  • Phishing and watering holes
  • Understanding advanced persistent threats
  • Ransomware: A modern form of extortion
  • Cryptomining
  • Hardware implants and other cyber FUD
2. Frameworks for Protection against Cyber Threats
  • The Orange Book: Early concepts in computer security
  • Understanding the NIST Cybersecurity Framework
  • Adopting the NIST Cybersecurity Framework
  • Understanding the basics of cyber risk
  • Analyzing cyber threats and controls
  • Recording, reporting, and the risk context
  • An advanced risk framework
  • Managing security with COBIT
  • COBIT for operational security
  • Introduction to cybersecurity controls
  • Cybersecurity control framework
  • Cybersecurity standards of good practice
3. Making Cybersecurity Effective
  • Architecting for security
  • Protecting payment card data
  • Clouding the issues
  • Securing things on the internet
  • Ensuring security is effective
4. Detecting and Managing Cyber Incidents
  • Incident management basics
  • Measuring incident management maturity
  • Detecting an attack
  • Hunting for threats
  • Responding to an incident
  • Communications plan and notification
5. Cyber Diplomacy
  • Cybersecurity goes global
  • Understanding cyber norms
  • Cybil and the Global Forum on Cyber Expertise
  • The Traffic Light Protocol
Conclusion
  • What's next

Taught by

Malcolm Shore

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX