Cyber Security Foundations: Start Building Your Career in Cyber Defense
Learn Path Description
Discover how to build cyber resilience in your organizationCyber security is one of the key challenges faced by organizations in the digital age. The estimated global cost of cyber attacks is predicted to rise as high as $10.5 trillion by 2025. Cyber resilience — the capacity to anticipate, respond, and recover from cyber attacks — is essential for modern organizations. This ExpertTrack will familiarize you with cyber security essentials to help protect your organization. You’ll learn why cyber security is important, studying real-life examples of malware attacks. You’ll also explore key defenses, such as ransomware protection and how to guard against social engineering attacks. This will be strengthened by best practices, such as password policy and mobile data security policy. The last half of this ExpertTrack focuses on identity and access management. This will help you control access to sensitive information, to support data security and cyber resilience. Explore why cyber security is important This ExpertTrack is made up of four cyber security courses, each of which will help you build organizational cyber resilience. The first is an introduction to why cyber security is so important. You’ll discover common cyber attacks, such as phishing, social engineering attacks, and ransomware, and how to protect against them. You’ll learn the organizational importance of mobile data security policy and password policy, and explore how to prepare for the worst with disaster management. The second course focuses on malware protection. You’ll understand different examples of malware attacks, such as trojan horses, spyware, and ransomware, and use this knowledge to build a malware protection strategy that is alive to the evolving threat posed by malware. Protect sensitive information with identity and access management The last two courses focus on identity and access management. This ensures sensitive information is only available to certain people, at certain times, to strengthen data security. You’ll cover key areas, such as single sign-on, authentication, and cloud identity management. Everything you learn in this ExpertTrack is founded on real-life, practical examples. You’ll be able to apply what you learn straightaway, to address the very real threat of cyber attacks. These cyber security courses have been designed by EC Council, the world’s largest cyber security technical certification body. EC-Council has trained and certified over 220,000 information security professionals globally. Requirements Minimum System Requirements Windows Requirements (Minimum) Mac Requirements (Minimum) Internet Browsers: Firefox 58.0+, Google Chrome 65.0+, Safari 10.0+ Operating System: Windows 2000 or higher with latest updates installed Operating System: Mac OS X 10.3+ Internet Connection: Broadband, 500+ Kbps Processor: 500MHz or faster Processor: 1.83 MHz Intel Core Duo Mobile: Safari in Apple iOS 8+, Google Chrome in Apple iOS 8+, Google Chrome in Android OS 4.1+ RAM: 128MB. Video Card: 128MB of video memory RAM: 128 MB. Video Card: 64 MB of video memory Browser Support: HTML5 compatible Sound Card: 16-bit Sound Card: 16-bit Industry statisticsUK job openings/month3,000Job satisfaction4.0/5Source: Glassdoor's Cybersecurity Salary page
Skills You Will Gain
Courses In This Learning Path
Total Duration
3 weeks
Level
Beginner
Learn Type
Certifications
Cyber Security Foundations: Why Cyber Security is Important
This course is for beginners and will focus on the importance of cybersecurity in today's environment. This course will be especially useful for IT professionals.
Cyberattacks cost an enormous amount of money each year, and this number is rising. Sources predict that cybercrime will cost $6 trillion in 2021, which is twice the amount for 2015. This figure is expected to reach $10.5 trillion by 2025 according to sources.
This course will teach you about cyber attacks such as phishing, viruses and social engineering and how to protect yourself. Learn how to create a secure password policy and incorporate ransomware protection. Also, best practices for mobile data privacy.
Understanding the risks involved in cyber security is essential to understand why it is so important.
This course will teach you about cyber security and some of the most dangerous cyber attacks. It also covers key topics like:
- How to create a strong password policy and how a password manager can increase data security
- 2. Risks associated with unknown USB drives.
- How to protect yourself against viruses and ransomware protection. What to do if you are infected.
- Cyber security risks related to social media, including cyber engineering attacks
- How to spot spear phishing emails and phishing emails
- Best practices for mobile data security including DNS redirects and VPNs
- How to prepare for the worst-case scenario and disaster recovery
This introduction to cyber security will help you take the first steps towards protecting your data. These cyber security basics will help you prevent sensitive information from getting in the wrong hands.
Total Duration
4 weeks
Level
Intermediate
Learn Type
Certifications
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
Accenture says malware attacks are the most frequent type of cyberattack experienced by organizations worldwide. These attacks are also the most costly. Accenture estimates that these attacks cost businesses on average $2.6 million per year. Ransomware is not the only cyber security risk from malware. Malware is any software designed to gain unauthorised access to a computer system, such as trojan horses or spyware.
This course will help you improve your company's cyber security against malware attacks. To understand the common threats and how to avoid them, you will be shown examples of malware attacks. Malware is always evolving. As the sophistication of existing actors grows, new threats are constantly emerging. Changes in business practices are part of the problem. Accenture found that 80% of companies were adopting new technologies quicker than they could account for cyber security risks.
This challenge can only be overcome by building organizational cyber resilience. Knowing your enemy is the first step to malware protection. This course will help you recognize your enemy and prevent them from causing harm.
Learn about the most common malware types and strategies. This will be illustrated with real-life examples of malware attacks. Further, you'll be able to understand the structure of modern malware families and how it evolves.
Total Duration
4 weeks
Level
Intermediate
Learn Type
Certifications
Cyber Security Foundations: Identity and Access Management
This cyber security training course will teach you about identity and access management. Access management and identity are key tools in data security. This describes how different users can be granted data permissions, and in what contexts. This helps to protect data security by making sure that sensitive information is only accessible by selected users at specific times. Cyber attacks and breaches are greatly reduced by identity and access management. Cyber resilience can be strengthened so that data security processes can be focused on vulnerable moments. Access management and identity management help to reduce human error, which is the leading cause of data breaches. This course will teach you key tools and models for identity management to increase your company's cyber resilience. This cyber security training course will introduce you to key access and identity management concepts. This is the first course in a series that covers identity and access management.
This course will explain: identity management and its importance, what authentication and identification are and why they are important, the significance and importance the identity management concept of authorization', and the role of organizational security processes in access and identity management.
This course is highly practical and aimed at helping you to improve your cyber security skills. The identity and access management concepts that you have learned at work will be immediately applicable to your company.
Total Duration
4 weeks
Level
Advanced
Learn Type
Certifications
Cyber Security Foundations: Reinforcing Identity and Access Management
Access to restricted data can be controlled through identity and access management. This ensures data security by limiting access to data only to authorized users and in certain contexts.
This course focuses on identity and access management. It is a continuation of the ExpertTrack course. You may find it helpful to complete the first course if you are just starting to learn about identity and access management.
This course will cover real-life scenarios in which access and identity management issues are faced. These will include B2C and enterprise integration. Case studies will be used to illustrate the learning. The use of identity and access management within the public sector will also be covered, including G2C services as well as citizen ID.
Case studies will be used to illustrate how the theory works in practice. You'll be able use the knowledge gained to improve your organization's cyber resilience and data security.
This course in cyber security covers basic topics that will help you understand key topics related to identity and access management. These topics include:
Cyber resilience and data security requirements are constantly evolving. This course will teach you how to create up-to-date access and identity management processes. This course will help you build a solid cybersecurity strategy for your company.