Cybersecurity Foundations
Offered By: LinkedIn Learning
Course Description
Overview
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Syllabus
Introduction
- Understanding the cybersecurity frameworks and standards
- What you should know
- Understanding the Cyber Kill Chain
- Pre-cyber threats
- The emergence of the cyber threats
- Botnets and the cybercrime industry
- Cloaking and alternate data streams
- Hiding using processes
- Controlling the target through a rootkit
- Phishing and watering holes
- Understanding advanced persistent threats
- Ransomware: A modern form of extortion
- Cryptomining
- Hardware implants and other cyber FUD
- The Orange Book: Early concepts in computer security
- Understanding the NIST Cybersecurity Framework
- Adopting the NIST Cybersecurity Framework
- Understanding the basics of cyber risk
- Analyzing cyber threats and controls
- Recording, reporting, and the risk context
- An advanced risk framework
- Managing security with COBIT
- COBIT for operational security
- Introduction to cybersecurity controls
- Cybersecurity control framework
- Cybersecurity standards of good practice
- Architecting for security
- Protecting payment card data
- Clouding the issues
- Securing things on the internet
- Ensuring security is effective
- Incident management basics
- Measuring incident management maturity
- Detecting an attack
- Hunting for threats
- Responding to an incident
- Communications plan and notification
- Cybersecurity goes global
- Understanding cyber norms
- Cybil and the Global Forum on Cyber Expertise
- The Traffic Light Protocol
- What's next
Taught by
Malcolm Shore
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy Offensive Security Engineering
Udemy Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn