Enroll yourself in the Cybersecurity Essentials course and lab to master the concepts and methodologies being used in the field of cybersecurity. The lab provides a hands-on learning experience in a safe and online environment. The cybersecurity course and lab will help you learn the cybersecurity basics and teach you how to work with infrastructure security, network security, security devices, local network security, and access control monitoring systems.

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Enroll yourself in the Cybersecurity Essentials course and lab to master the concepts and methodologies being used in the field of cybersecurity. The lab provides a hands-on learning experience in a safe and online environment. The cybersecurity course and lab will help you learn the cybersecurity basics and teach you how to work with infrastructure security, network security, security devices, local network security, and access control monitoring systems.

1
  • Introduction

  • Security Challenges
    Who Should Read This Course
    What Is Covered in This Course

2
  • Infrastructure Security in the Real World

  • Security Challenges
    Summary

3
  • Understanding Access-Control and Monitoring Systems

  • A Quick Primer on Infrastructure Security
    Access Control
    Security Policies
    Physical Security Controls
    Access-Control Gates
    Authentication Systems
    Remote-Access Monitoring
    Hands-On Exercises

4
  • Understanding Video Surveillance Systems

  • Video Surveillance Systems
    Hands-On Exercises

5
  • Understanding Intrusion-Detection and Reporting Systems

  • Intrusion-Detection and Reporting Systems
    Hands-On Exercises

6
  • Infrastructure Security: Review Questions and Hands-On Exercises

  • Summary Points
    Security Challenge Scenarios
    Review Questions

7
  • Local Host Security in the Real World

  • Security Challenges
    Summary

8
  • Securing Devices

  • The Three Layers of Security
    Securing Host Devices
    Hands-On Exercises

9
  • Protecting the Inner Perimeter

  • The Inner Perimeter
    Hands-On Exercises

10
  • Protecting Remote Access

  • Protecting Local Computing Devices
    Implementing Local Protection Tools
    Using Local Intrusion-Detection Tools
    Configuring Browser Security Options
    Defending Against Malicious Software
    Hardening Operating Systems
    Overseeing Application Software Security
    Applying Software Updates and Patches
    Hands-On Exercises

11
  • Local Host Security: Review Questions and Hands-On Exercises

  • Summary Points
    Security Challenge Scenarios
    Review Questions

12
  • Local Network Security in the Real World

  • Security Challenges
    Summary

13
  • Networking Basics

  • Understanding the Basics of Networking
    The OSI Networking Model
    Data Transmission Packets
    OSI Layer Security
    Network Topologies
    Logical Topologies
    Hands-On Exercises

14
  • Understanding Networking Protocols

  • The Basics of Networking Protocols
    Network Control Strategies
    Hands-On Exercises

15
  • Understanding Network Servers

  • The Basics of Network Servers
    Hands-On Exercises

16
  • Understanding Network Connectivity Devices

  • Network Switches
    Routers
    Gateways
    Network Bridges
    Wireless Network Connectivity
    Hands-On Exercises

17
  • Understanding Network Transmission Media Security

  • The Basics of Network Transmission MEDIA
    Transmission Media Vulnerabilities
    Hands-On Exercises

18
  • Local Network Security: Review Questions

  • Summary Points
    Security Challenge Scenarios

19
  • Perimeter Security in the Real World

  • Security Challenges
    Summary

20
  • Understanding the Environment

  • The Basics of Internet Security
    Understanding the Environment
    Hands-On Exercises

21
  • Hiding the Private Network

  • Understanding Private Networks
    Hands-On Exercises

22
  • Protecting the Perimeter

  • Understanding the Perimeter
    Firewalls
    Network Appliances
    Proxy Servers
    Demilitarized Zones (DMZs)
    Honeypots
    Extranets
    Hands-On Exercises

23
  • Protecting Data Moving Through the Internet

  • Securing Data in Motion
    Cryptography
    Hands-On Exercises

24
  • Tools and Utilities

  • Using Basic Tools
    Monitoring Tools and Software
    Hands-On Exercises

25
  • Identifying and Defending Against Vulnerabilities

  • Zero Day Vulnerabilities
    Software Exploits
    Social Engineering Exploits
    Network Threats and Attacks
    Dictionary Attacks
    Denial of Service (DoS) Attacks
    Spam
    Other Exploits
    Hands-On Exercises

26
  • Perimeter Security: Review Questions and Hands-On Exercises

  • Summary Points
    Security Scenario Review
    Review Questions

27
  • Appendix A: NIST Preliminary Cybersecurity Framework

  • Identify
    Protect
    Detect
    Respond
    Recover

Audience

Anyone interested in the foundational concepts of cybersecurity will benefit from this course.

Language

English

Prerequisites

There are no rerequisites for this course.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...