Cybersecurity Essentials

By Ernest Ej Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

This course is for those who have very little knowledge of computers & technology with no prior knowledge of cyber security. The hands-on, step-by-step teaching approach enables you to grasp all the information presented, even if some of the topics are new to you. You’ll learn real-world cyber security fundamentals to serve as the foundation of your career skills and knowledge for years to come.

Basically, this course is for you if your answer to any of the questions below is yes

  • Are you new to cyber security and in need of an introduction to the fundamentals?
  • Are you bombarded with complex technical security terms that you don’t understand?
  • Do you need to be conversant in basic security concepts, principles, and terms, but do not need “deep in the weeds” detail?
  • Have you decided to make a career change to take advantage of the job opportunities in cyber security and need formal training/certification?
  • Are you a manager who lays awake at night worrying that your company may be the next mega-breach headline story on the 6 o’clock news?
Show More

What Will You Learn?

  • At the end of this course, you would not have only have a full grasp of how computers and networks work, you would have gained the needed knowledge to communicate the basic concepts and terminologies around cybersecurity. Additionally, this course will help lay the foundation for a successful career in cybersecurity. Finally, this course will also help business leaders that are concerned about securing their data against cyber attacks

Course Content

Introduction to Cybersecurity
This chapter introduces the students to the idea behind cybersecurity.

Basic Computer Function
This course covers the basic knowledge of computers and networks. We cover the difference between the hard drive and Random Access Memory (RAM). In short, how a computer works. Attack uses something that exists for perfectly valid reasons and misuses it in invalid malicious ways. To work in cyber security, you have to understand the valid functions to understand the potential for invalid misuse.

Computer Numbering System & ASCII
This would cover decimals, binary, hexadecimal. We would also talk about terms like kilobyte, megabyte, gigabyte, and terabyte and what those terms mean

Basics of Computer Networking
We learn how information moves from point A to point B across a network without using any technical terminology of any kind. This discussion includes both Internet and Local Area Network (LAN) examples. As we move on through the day, we slowly add the technical aspects of those explanations, including the terms and acronyms of networking. We discuss the origins of the Internet and why that origin matters to modern-day cyber security. We explain what a protocol is, and what both the OSI and TCP/IP stacks are and why they matter. You learn about standard network hardware such as a network interface card, a switch, and a router. We progress to topics such as IP addresses, network masks, default gateways, and routing. We explain, compare, and contrast the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) and why you might want to use one over the other. Eventually, we get to network protocols such as the Dynamic Host Control Protocol (DHCP), Domain Name System (DNS), and Network Address Translation (NAT).

Security Technologies
Recognize and understand the following security terminologies: anti-malware, firewalls, intrusion detection systems, sniffers, ethical hacking, active defense, and threat hunting.

Understanding Frequent Security Attacks
Understanding types of malware, social engineering, drive-by downloads, watering hole attacks, lateral movement, and other attacks

Basic Knowledge of Preventing Cybersecurity Attacks
Understand browser security and the privacy issues associated with web browsing Explain system hardening Discuss system patching

Understanding Virtual Machines and Cloud Computing
We learn about the basic concepts of virtual machines and cloud computing.

Backup and Disaster Recovery
Understand backups and create a backup plan for your personal life that virtually guarantees you never have to pay ransom to access your data

Student Ratings & Reviews

No Review Yet
No Review Yet
Back to top of page