Course description
Beginners Guide to Cybersecurity
A tech talent shortage continues as organizations adopt higher security standards to address the ongoing risk of threats and breaches. This course builds key skills to address common security threats and risks and provides best practices to guard against them.
This course is designed for everyone, especially those interested in a Cyber Analyst I or an entry-level Cloud & Security Engineer role, as well as Tech Support. Diving into the world of cybersecurity, you’ll gain critical skills employers need, including identifying security threats, understanding encryption uses, demonstrating safe browsing techniques, implementing email security best practices. and identifying and becoming familiar with various types of cybersecurity risks and threats. This course is ideal for technical support roles, often on the front lines of defense for cybersecurity issues.
Upcoming start dates
Who should attend?
Prerequisites
Basic computer operating skills, including using a web browser.
Training content
Module 1: Common Security Threats and Risks
- Confidentiality, Integrity, and Availability Concerns
- Importance of Security and Information Privacy
- Security Threats and Ways of Breaches
- Different Types of Security Threats
- (Optional Activity) Cybersecurity Ops: Terminal
Module 2: Password Management and Security Best Practices
- Password Management Techniques
- Authentication, Authorization, and Accounting
- Ways to Hardening Devices
- Validation and Device usage
- Encryption Concepts
- Emails and Spam Management
Module 3: Security Concerns and Safe Browsing
- Application Ecosystem Security
- Public Browsing Risks
- Browser Security Settings
- Safe Browsing Techniques
- Security Threats: Virtual Private Networks
Course delivery details
This course is offered through IBM, a partner institute of EdX.
4–6 hours per week
Costs
- Verified Track -$49
- Audit Track - Free
Certification / Credits
What you'll learn
- Recognize the importance of data security, maintaining data integrity, and confidentiality.
- Demonstrate the installation of software updates and patches.
- Identify preferred practices for authentication, encryption, and device security.
- Discuss types of security threats, breaches, malware, social engineering, and other attack vectors.
Contact this provider
edX
edX For Business helps leading companies upskill their labor forces by making the world’s greatest educational resources available to learners across a wide variety of in-demand fields. edX For Business delivers high-quality corporate eLearning to train and engage your employees...