Investigate cybersecurity threats and master techniques needed to protect your network.
When you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes obvious: An in-depth and thorough understanding of cyber security fundamentals and best practices is absolutely necessary.
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
You will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained Workshop environment, you will work with live viruses, including botnets, worms, and Trojans.
Workshop 1: Workshop Setup
Workshop 2: Understanding TCP/IP
Workshop 3: Vulnerability Assessment
Workshop 4: Cyber Awareness
Workshop 5: Cyber Scanning
Workshop 6: Cyber Attacks and Passwords
Workshop 7: Cyber Attacks and Backdoors
Workshop 8: Risk Assessment
Workshop 9: Security Policies
Workshop 10: Host Security
Workshop 11: Covert Communications
Workshop 12: Authentication and Cryptography
Workshop 13: Snort IDS
Workshop 14: Forensic Analysis
Workshop 15: Business Continuity Plan