Want A Job In Cybersecurity - Foundation Concepts To Know
Published 10/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.11 GB | Duration: 4h 45m
Published 10/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.11 GB | Duration: 4h 45m
Master The Foundation Concepts For A Career In Cybersecurity
What you'll learn
Foundational Security Concepts
Introduction to Network Security
Foundations of Security Architecture
Access Control
Cloud Risks and Controls
Business Continuity, Disaster Recovery, and Incident Response
Operations in the Cybersecurity World
Requirements
Basic IT Skills
Description
Want a Job in Cybersecurity - Foundation Concepts To KnowGet ready to make a career move into the world of Cybersecurity!Research shows that there's a global shortage of qualified cybersecurity professionals. Move fast to take advantage of this shortage! Quickly finding a job in cybersecurity is a very smart career move. It's the hot thing in the job market right now - but to get in, you need to show that you have a solid understanding of cybersecurity concepts.This course covers the basics:Foundational Security ConceptsNetwork SecurityAccess ControlCloud Risks and ControlsBusiness Continuity, Disaster Recovery, and Incident ResponseOperations in the Cybersecurity WorldDuring the course we'll cover the key subject areas that form a foundational knowledge of cybersecurity. The goal is to prepare you with a basic understanding of core concepts and then anticipate the types of interview questions that may be asked. If you are prepared and can anticipate the questions….Then you're ready to increase your odds of doing well during the interview process!Topics covered and skills learned:Understand the security concepts of Information AssuranceLearn Risk Management processes and techniquesTypes of security controls - Technical, Physical, and AdministrativeBecome familiar with best practices for security governanceLearn about Business Continuity, Disaster Recovery, and Incident ResponseUnderstand various access control models - DAC, NDAC, MAC, RBACLearn how encryption can be used to secure data and communicationsBecome comfortable with network models (OSI and TCP) and secure network designUnderstand how the TCP protocol functions and how it can be securedGet detailed information on firewalls, intrusion detection, and anti-virusBe able to identify threats and malware then be able to recommend safeguardsUnderstand how the Cloud impacts security and ways to mitigate cloud-based risksWho this course is for:Students wanting to show they have a solid cybersecurity foundationProfessionals changing careers and wanting to move into cybersecurityAnyone wanting to get a deeper understanding of cybersecurity practicesIT professionals wanting to grow their knowledge and move into a cybersecurity role
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Understanding the Fundamentals
Section 2: Foundations of Cybersecurity
Lecture 3 Information Assurance
Lecture 4 Security Controls
Lecture 5 Safeguarding CIA
Section 3: Identifying and Handling Risk
Lecture 6 Risk Management - Terminology
Lecture 7 Risk Management - Assessment and Treatment
Section 4: Business Continuity, Disaster Recovery, and Incident Response
Lecture 8 Business Continuity and Disaster Recovery
Lecture 9 Incident Lifecycle
Lecture 10 Forensics
Section 5: Access Controls
Lecture 11 Application of Logical Access Control
Lecture 12 Physical Access Controls
Section 6: Cryptography
Lecture 13 Encryption Terminology
Lecture 14 Encryption, Hashing, and Digital Signatures
Section 7: Network and Communications Security
Lecture 15 Fundamentals of Networking
Lecture 16 The OSI Model
Lecture 17 The TCP Model
Lecture 18 TCP/IP Networking Basics
Lecture 19 Security and Network Devices
Lecture 20 Secure Network Design
Section 8: Security in the Cloud
Lecture 21 Cloud Offerings
Section 9: System and Application Security
Lecture 22 Threats and Attacks
Lecture 23 Common Malware Types
Section 10: Governance, Risk, and Compliance
Lecture 24 Governance Process
Lecture 25 Acceptable Use Policy
Lecture 26 Data Handling Policy
Lecture 27 Change Management Policy
Lecture 28 System Hardening Policy
Lecture 29 Patch Management Policy
Lecture 30 Password Policy
Lecture 31 Bring Your Own Device Policy
Lecture 32 Security Awareness
Section 11: Conclusion
Lecture 33 Summary and Thank You
Students wanting to show they have a solid cybersecurity foundation,Anyone preparing for entry or foundation level cybersecurity certification exams,Professionals changing careers and wanting to move into cybersecurity,Anyone wanting to get a deeper understanding of cybersecurity practices,IT professionals wanting to grow their knowledge and move into a cybersecurity role