Cybersecurity Foundations
Offered By: LinkedIn Learning
Course Description
Overview
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Syllabus
Introduction
- Understanding the frameworks, standards, and technology that form what we know as cybersecurity
- What you should know
- The Orange Book: Early concepts in computer security
- Understanding the NIST Cybersecurity Framework
- Adopting the NIST Cybersecurity Framework
- Understanding the basics of cyber risk
- Analyzing cyber threats and controls
- Recording, reporting, and the risk context
- An advanced risk framework
- Managing security with COBIT
- COBIT for operational security
- Introduction to cybersecurity controls
- Cybersecurity control framework
- The ISF Standard of Good Practice
- ASD and its top controls
- Protecting payment card data
- Clouding the issues
- Securing things on the internet
- Making sure security is effective
- Understanding the cyber kill chain
- Revisiting traditional threats
- Botnets and the cyber crime industry
- Cloaking and alternate data streams
- Hiding using processes
- Controlling the target through a rootkit
- Understanding advanced persistent threats
- Ransomware: A modern form of extortion
- Hardware implants and other cyber FUD
- Incident management basics
- Measuring incident management maturity
- Detecting an attack
- Responding to an incident
- What's next
Taught by
Malcolm Shore
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network