Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Course (3 Modules)
Start Here
Cybersecurity Course Program Overview
Cybersecurity Course Symbol Legend
Module 1: Fundamental Cybersecurity
Module 1 Overview
Lesson 1: Understanding Cybersecurity (22:09)
Exercise 1.1
Lesson 2: Cybersecurity Basics (14:34)
Exercise 1.2
Lesson 3: Basic Cybersecurity Framework (11:06)
Exercise 1.3
Lesson 4: Common Cybersecurity Industry Standards & Frameworks (11:17)
Exercise 1.4
Lesson 5: Cybersecurity and Contemporary Data Science Technologies (10:07)
Exercise 1.5
Lesson 6: Cybersecurity Metrics (11:09)
Exercise 1.6
Module 2: Advanced Cybersecurity
Module 2 Overview
Lesson 1: Cybersecurity Mechanisms (32:28)
Exercise 2.1
Lesson 2: Cybersecurity Monitoring Mechanisms (10:23)
Exercise 2.2
Lesson 3: Cybersecurity Processes (26:27)
Exercise 2.3
Lesson 4: Understanding Cyber Threats and Attacks (7:33)
Lesson 5: Common Cyber Threats and Attacks (62:31)
Exercise 2.4
Supplement: Cybersecurity Mechanisms and Processes Mapping Reference Matrix
Supplement: Cybersecurity Mechanisms and Threats Mapping Reference Matrix
Supplement: Cybersecurity Metrics and Monitors Mapping Reference Matrix
Supplement: Cybersecurity Metrics and Processes Mapping Reference Matrix
Supplement: Cybersecurity Processes and Threats Mapping Reference Matrix
Supplement: Cybersecurity Metrics and Monitors Mapping Reference Matrix
Supplement: Cybersecurity Metrics to Monitor Mechanisms Mapping Reference Matrix
Module 3: Cybersecurity Lab
Module 3 Overview
Reading Exercise 3.1: ENO Bank Background
Lab Exercise 3.2: Data Breach
Lab Exercise 3.3: Hidden Malware
Lab Exercise 3.4: Cybersecurity Processes
Lab Exercise 3.5: Cybersecurity Metrics
Reading Exercise 3.6: ITI Background
Lab Exercise 3.7: Ransomware
Lab Exercise 3.8: Phishing
Lab Exercise 3.9: Cybersecurity Processes
Lab Exercise 3.10: Cybersecurity Metrics
Reading Exercise 3.11: Auto-Mech Background
Lab Exercise 3.12: Botnet and DoS
Lab Exercise 3.13: Software Exploit and SQL Injection
Lab Exercise 3.14: Cybersecurity Processes
Lab Exercise 3.15: Cybersecurity Metrics
Reading Exercise 3.16: Top Sector Financial (TSF) Background
Lab Exercise 3.17: Malicious Insider
Lab Exercise 3.18: The Trap
Lab Exercise 3.19: Cybersecurity Processes
Lab Exercise 3.20: Cybersecurity Metrics
Supplement: Cybersecurity Module 3 Mind Map Poster
Become a Certified Cybersecurity Architect
Step 1 - Take the Self-Test (Optional)
Step 2 - Order and Schedule the Exam
Step 3 - Purchase Exam Prep Kit (Optional)
Add-Ons
Instructor-Led Training & Coaching Information
Online Coaching Order
Printed Course Materials
Lesson 5: Common Cyber Threats and Attacks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock