YoVDO

Navigating the Cybersecurity Threat Landscape

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Web Application Security Courses Supply Chain Security Courses Identity and Access Management Courses Cyber Resilience Courses OWASP Top 10 Courses Threat Landscape Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the dynamic cybersecurity landscape. Learn about key concepts, including vulnerabilities, threats, and the OWASP Top 10 security standard. Find out about identity and access management, supply chain risks, essential policies and resources, cyber resilience practices, and safeguarding digital assets. Plus, get guidance on transitioning to a career in cybersecurity.
  • Analyze web app risks and identify access management needs.
  • List supply-chain cyber threats and plan risk mitigation.
  • Implement policies and practices for cyber resilience.
  • Describe ways to transition into a cybersecurity career.

Syllabus

Courses under this program:
Course 1: The Cybersecurity Threat Landscape
-Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.

Course 2: Learning the OWASP Top 10
-Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).

Course 3: Introduction to Identity and Access Management
-Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.

Course 4: Supply Chain Cybersecurity: Preventing Supply Chain Attacks
-Explore security frameworks and practical strategies to prevent supply chain attacks on your organization.

Course 5: Cybersecurity: Key Policies and Resources
-Learn about cybersecurity policies, related resources, and how cybersecurity fits in with public policies and laws.

Course 6: Cyber Resilience: An Overview
-Learn about the concept of cyber resilience as a cybersecurity program and prepare for the latest threats in the rapidly evolving threat landscape.

Course 7: Transitioning to a Career in Cybersecurity
-Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.


Courses

  • 0 reviews

    35 minutes

    View details
    Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).
  • 0 reviews

    1 hour

    View details
    Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
  • 0 reviews

    1 hour 20 minutes

    View details
    Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.
  • 0 reviews

    41 minutes

    View details
    Learn about cybersecurity policies, related resources, and how cybersecurity fits in with public policies and laws.
  • 0 reviews

    42 minutes

    View details
    Explore security frameworks and practical strategies to prevent supply chain attacks on your organization.
  • 0 reviews

    58 minutes

    View details
    Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
  • 0 reviews

    1 hour 3 minutes

    View details
    Learn about the concept of cyber resilience as a cybersecurity program and prepare for the latest threats in the rapidly evolving threat landscape.

Taught by

Marc Menninger, CISSP, CRISC, Caroline Wong, Mandy Huth, CISSP, CIPT, QTE, Nicole Dove, Gregory Michaelidis and Tia (Yatia) Hopkins

Related Courses

Introduction to OWASP Top 10 Security Risks
A Cloud Guru
OWASP Top 10: Broken Access Control
Codecademy
OWASP Top 10: Cryptographic Failures
Codecademy
OWASP Top 10: Injection Attacks
Codecademy
Fundamentals of Secure Software
Packt via Coursera