Cybersecurity Basics

This course will teach you the basics of cybersecurity. You will learn about the different types of attacks and how to protect yourself from them. You will also learn about the different tools and technologies that are used in cybersecurity.

This course is ideal for:

  • Absolute beginners who want to learn about cybersecurity.
  • Those who want to learn about the different tools and technologies that are used in cybersecurity
  • Corporate level executives looking t understand the basics of cybersecurity
  • Small business owners who want to protect their businesses from cyber attacks
  • Computer Science or IT graduates who want to branch out into cybersecurity
  • Cybersecurity professionals and security consultants who want to refresh their knowledge

By the end of this course, you will be able to:

  • Understand the basics of cybersecurity.
  • Identify the different types of attacks.
  • Protect yourself from attacks.
  • Understand the different tools and technologies used in cybersecurity
  • Develop a cybersecurity policy for your organization.
  • Implement a risk management framework in your organization.
  • Respond to a security incident in your organization.
  • Plan your career in cybersecurity.
1
Curriculum
Prerequisites
f
Career Opportunities in Cybersecurity

This course is divided into the following modules:

Module 1: Introduction to Cybersecurity

In this module, you will learn about the basics of cybersecurity. You will learn about the different types of attacks and how to protect yourself from them. You will also learn about the different tools and technologies that are used in cybersecurity.

Topics:

  • Cybersecurity Fundamentals and History
  • The Cybersecurity Landscape
  • The Different Types of Attacks
  • Secure Architecture
  • Wireless Networks
  • How to Protect Yourself from Attacks

Module 2: Cyber Attackers and Features Extraction

In this module, you will learn about the different types of cyber attackers. You will learn about their motivations and the methods that they use to carry out attacks.

Topics:

  • Introduction to Cyber Attackers
  • Motivations of Cyber Attackers
  • Methods Used by Cyber Attackers
  • Clustering and Correlation
  • Features and Behavior Extraction
  • Digital Footprints

Module 3: Key Security Concepts

In this module, you will learn about some of the key concepts in cybersecurity. You will learn about risk management, security controls, and incident response.

Topics:

  • Risk Management and Frameworks
  • IoT Security
  • BYOD
  • Network Security Controls
  • Cloud and Virtualization
  • Security Testing
  • CIA Triad
  • Security Controls
  • IT Governance and best practices
  • Incident Response

Module 4: Cybersecurity Technologies

In this module, you will learn about some of the different tools and technologies that are used in cybersecurity. You will learn about firewalls, intrusion detection systems, and encryption.

Topics:

  • Encryption technology
  • Internet Foundations and Analysis
  • Digital Forensics
  • Firewalls
  • Intrusion Detection Systems

Module 5: Cybersecurity Policies and Procedures

In this module, you will learn about the different policies and procedures that are used in cybersecurity. You will learn about the different types of standards that can be used to secure systems. You will also learn about the different types of audits that can be conducted to assess the security of systems.

Topics:

  • Incident Response Plans
  • Business Continuity and Disaster Recovery
  • Security Awareness Programs
  • Security Audits

Module 6: Careers in Cybersecurity

In this module, you will learn about some of the different career paths that are available in cybersecurity. You will learn about the skills that you need to get started in cybersecurity.

Topics:

  • Career Paths in Cybersecurity
  • Skills Needed for Cybersecurity
  • Cybersecurity Certifications
  • Cybersecurity Salaries
  • How to Get Started in Cybersecurity

Module 7: Final Exam

In this module, you will take the final exam for the course. This will test your knowledge of all of the topics covered in the course.

No prior experience with cybersecurity is required. However, basic IT knowledge, networks, operating systems, cybersecurity awareness, and general computer principles are an added advantage.

To succeed in completing this course, you need:

  • To have a GCP account
  • To attend 80% of the sessions.
  • Submit assignments on time.
  • To have access to a computer/laptop.
  • To have access to the internet for online sessions.
  • Submit weekly projects for grading.

Cybersecurity is a rapidly growing field with many career opportunities. This course will give you the skills and knowledge you need to start your career in cybersecurity. As a certified professional in cybersecurity, you will be able to find jobs as a:

  • Security Analyst
  • Security Consultant
  • Bounty Hacker
  • Security Engineer
  • Security Architect
  • Security Administrator
  • Network Security Specialist