YoVDO

Describe the basic concepts of cybersecurity

Offered By: Microsoft via Microsoft Learn

Tags

Cybersecurity Courses Cryptography Courses

Course Description

Overview

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
  • After completing this module, you will be able to:

    • Define what is cybersecurity
    • Describe the basic threat landscape
    • Describe different types of Malware
    • Describe basic mitigation strategies
  • Module 2: Describe concepts of cryptography
  • After completing this module, you will be able to:

    • Describe some of the basic concepts of cryptography
    • Describe encryption and is uses in cybersecurity
    • Describe hashing and digital signing
    • Describe the concept and use of digital certificates
  • Module 3: Describe authentication and authorization in cybersecurity
  • After completing this module, you will be able to:

    • Define authentication
    • Describe common authentication-based attacks
    • Describe authorization security techniques
  • Module 4: Describe basic networking concepts and how they relate to cybersecurity
    • Describe the basics of networks
    • Describe the threats to network security
    • Describe ways to protect your network
    • Describe ways to securely connect to and communicate over a network
  • Module 5: Describe device-based threats and security controls
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device-related threats
  • Module 6: Describe application-based threats and security controls
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications

Syllabus

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
    • Introduction
    • Describe what is cybersecurity
    • Describe the threat landscape
    • Describe malware
    • Describe basic mitigation strategies
    • Knowledge check
    • Summary and resources
  • Module 2: Describe concepts of cryptography
    • Introduction
    • Describe cryptography
    • Describe encryption and its use in cybersecurity
    • Describe hashing and its application in digital signing
    • Describe digital certificates
    • Knowledge check
    • Summary and resources
  • Module 3: Describe authentication and authorization in cybersecurity
    • Introduction
    • Define authentication
    • Describe authentication-based attacks
    • Describe authorization security techniques
    • Knowledge check
    • Summary and resources
  • Module 4: Describe network-based threats and mitigations
    • Introduction
    • Describe the different types of networks
    • Describe how data moves around a network
    • Describe threats to network security
    • Protect your network
    • Knowledge check
    • Summary and resources
  • Module 5: Describe device-based threats and security controls
    • Introduction
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device related threats
    • Knowledge check
    • Summary and resources
  • Module 6: Describe application-based threats and how to protect against them
    • Introduction
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications
    • Knowledge check
    • Summary and resources

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network