YoVDO

Describe the basic concepts of cybersecurity

Offered By: Microsoft via Microsoft Learn

Tags

Cybersecurity Courses Cryptography Courses

Course Description

Overview

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
  • After completing this module, you will be able to:

    • Define what is cybersecurity
    • Describe the basic threat landscape
    • Describe different types of Malware
    • Describe basic mitigation strategies
  • Module 2: Describe concepts of cryptography
  • After completing this module, you will be able to:

    • Describe some of the basic concepts of cryptography
    • Describe encryption and is uses in cybersecurity
    • Describe hashing and digital signing
    • Describe the concept and use of digital certificates
  • Module 3: Describe authentication and authorization in cybersecurity
  • After completing this module, you will be able to:

    • Define authentication
    • Describe common authentication-based attacks
    • Describe authorization security techniques
  • Module 4: Describe basic networking concepts and how they relate to cybersecurity
    • Describe the basics of networks
    • Describe the threats to network security
    • Describe ways to protect your network
    • Describe ways to securely connect to and communicate over a network
  • Module 5: Describe device-based threats and security controls
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device-related threats
  • Module 6: Describe application-based threats and security controls
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications

Syllabus

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
    • Introduction
    • Describe what is cybersecurity
    • Describe the threat landscape
    • Describe malware
    • Describe basic mitigation strategies
    • Knowledge check
    • Summary and resources
  • Module 2: Describe concepts of cryptography
    • Introduction
    • Describe cryptography
    • Describe encryption and its use in cybersecurity
    • Describe hashing and its application in digital signing
    • Describe digital certificates
    • Knowledge check
    • Summary and resources
  • Module 3: Describe authentication and authorization in cybersecurity
    • Introduction
    • Define authentication
    • Describe authentication-based attacks
    • Describe authorization security techniques
    • Knowledge check
    • Summary and resources
  • Module 4: Describe network-based threats and mitigations
    • Introduction
    • Describe the different types of networks
    • Describe how data moves around a network
    • Describe threats to network security
    • Protect your network
    • Knowledge check
    • Summary and resources
  • Module 5: Describe device-based threats and security controls
    • Introduction
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device related threats
    • Knowledge check
    • Summary and resources
  • Module 6: Describe application-based threats and how to protect against them
    • Introduction
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications
    • Knowledge check
    • Summary and resources

Tags

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera