Course summary
Cyber security is much more than a matter of IT. It can be said that, in the world of business there are only two companies today, those that have been hacked, and those that will be! This covey the importance of cyber security. This course on 'Fundamentals of Cyber Security' provides knowledge of cyber security and the threats involved in security breaches by way of malwares and other cybersecurity attacks. The course also deals with enterprise architecture in detail.
Learning outcome
By the end of the course, learner will be able to:
- Understand the fundamentals of cyber security and the different disciplines covered under cyber security.
- Explain the different types of cyber security threats and attacks.
- Understand the enterprise architecture and the different components of enterprise architecture.
Modules
Protecting the organization's business, reputation and all aspects of business depends on how well the cyber security is imposed in the organization. It is every employee's responsibility to ensure cyber security. Learner will get an overview of cyber security and its importance, and the various disciplines under cyber security.
The hackers want what you have got. Don’t give it to them. The business depends of data and how well it is secured. Learner will get insights about data security and its importance, types, and solutions to secure data.
Detecting the vulnerabilities beforehand and finding, fixing and enhancing the security of applications is of prime importance for any business. Learners will get complete insights about application security, how it can be carried out, its importance and solutions to secure.
Network security isn't simple as it involves a multitude of technologies, devices and processes. Understanding of network security is essential for ensuring cyber security. Learners will get a thorough understanding of this complex area of network security in detail .
Vulnerability is the single biggest threat to any organization. The success of business operations lies in its secrecy. Learners will gain knowledge about operational security, best practices and access management.
Controls and restrictions are of prime importance in cyber security. Learners will get insights about privilege access management, its importance and the best practices.
While vulnerability is the key to cyber attack, all organizations are vulnerable at large how much ever secured they try to make. Learners will gain knowledge about vulnerability management, enterprise mobility management, business continuity and disaster recovery, and security training.
Every organization is at risk to the threat of cyber attack. Every lock has a key somewhere right now or in some time. Therefore, being aware of the cyber security threats is essential for an organization's measure in keeping themselves secured. Learner will become aware of the cyber security threats, its types and the CIA guidelines.
If cyber security is a shared responsibility of everyone in the organization, then knowing about password related attacks is essential for all. Learner will get insights about malware and its variants like virus, worms, trojans, etc. and the ways of password attacks and how to protect the passwords.
Cyber security is dependent on the whole structure and operation of the organization. Learner will get a thorough understanding of enterprise security architecture, its design principles, domain classification, trust levels, tiered networks, and security controls.
This module builds a comprehensive understanding of phishing attacks, focusing on how to recognize and respond to them effectively. Learners will explore the various stages of a phishing attack and the social engineering tactics used by attackers. It highlights the corporate implications of phishing and emphasizes the importance of maintaining good security hygiene.