Course curriculum

    1. Segment 01 - Introduction to the course & instructor

    2. Segment 02 - Getting Started: Defining Cybersecurity

    3. Segment 03 - Reviewing The Security Model: Authentication

    4. Segment 04 - Your Data Online: Confidentiality, Integrity, & Availability

    5. Segment 05 - Key Concepts: Authorization & Non-Repudiation

    1. Segment 06 - Top 4: The Most Common Cyber Attacks

    2. Segment 07 - The Psychology Behind Cyber Attacks

    3. Segment 08 - Playing Defense Through Risk Mitigation

    1. Segment 09 - Going Beyond Traditional Passwords

    2. Segment 10 - Three Key Elements For Authentication

    3. Segment 11 - Vulnerability Alert: Email Spoofing

    4. Segment 12 - Top 6: Keys For Securing Your Emails At Work

    1. Segment 13 - Identifying Different Types Of Data

    2. Segment 14 - Protecting Data Through Encryption

    3. Segment 15 - Protecting Data Through Deletion (Part 1)

    4. Segment 16 - Protecting Data Through Deletion (Part 2)

    1. Segment 17 - The Framework Of IR

    2. Segment 18 - The Early Steps Of The IR Process

    3. Segment 19 - The Final Steps of the IR Process

    4. Segment 20 - Conclusion & Takeaways

About this course

  • Free
  • 20 lessons
  • 1 hour of video content

Discover your potential, starting today