Describe the basic concepts of cybersecurity
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Describe basic cybersecurity threats, attacks, and mitigations
- Define what is cybersecurity
- Describe the basic threat landscape
- Describe different types of Malware
- Describe basic mitigation strategies
- Module 2: Describe concepts of cryptography
- Describe some of the basic concepts of cryptography
- Describe encryption and is uses in cybersecurity
- Describe hashing and digital signing
- Describe the concept and use of digital certificates
- Module 3: Describe authentication and authorization in cybersecurity
- Define authentication
- Describe common authentication-based attacks
- Describe authorization security techniques
- Module 4: Describe basic networking concepts and how they relate to cybersecurity
- Describe the basics of networks
- Describe the threats to network security
- Describe ways to protect your network
- Describe ways to securely connect to and communicate over a network
- Module 5: Describe device-based threats and security controls
- Describe what your device knows about you
- Describe how devices and become cybersecurity threats
- Describe how to mitigate against device-related threats
- Module 6: Describe application-based threats and security controls
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
After completing this module, you will be able to:
After completing this module, you will be able to:
After completing this module, you will be able to:
Syllabus
- Module 1: Describe basic cybersecurity threats, attacks, and mitigations
- Introduction
- Describe what is cybersecurity
- Describe the threat landscape
- Describe malware
- Describe basic mitigation strategies
- Knowledge check
- Summary and resources
- Module 2: Describe concepts of cryptography
- Introduction
- Describe cryptography
- Describe encryption and its use in cybersecurity
- Describe hashing and its application in digital signing
- Describe digital certificates
- Knowledge check
- Summary and resources
- Module 3: Describe authentication and authorization in cybersecurity
- Introduction
- Define authentication
- Describe authentication-based attacks
- Describe authorization security techniques
- Knowledge check
- Summary and resources
- Module 4: Describe network-based threats and mitigations
- Introduction
- Describe the different types of networks
- Describe how data moves around a network
- Describe threats to network security
- Protect your network
- Knowledge check
- Summary and resources
- Module 5: Describe device-based threats and security controls
- Introduction
- Describe what your device knows about you
- Describe how devices and become cybersecurity threats
- Describe how to mitigate against device related threats
- Knowledge check
- Summary and resources
- Module 6: Describe application-based threats and how to protect against them
- Introduction
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
- Knowledge check
- Summary and resources
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network