The Cybersecurity course develops an understanding of common cybersecurity threats and vulnerabilities and further develops skills in the technologies and practices used to prevent and counter cyber-attacks.
It establishes a set of mechanisms that represent the common components that comprise cybersecurity solutions.
Upon completing the course you will receive a digital certificate of completion, as well as a digital training badge from Acclaim/Credly. Upon getting certified you will also receive an official Cybersecurity Specialist digital accreditation certificate and certification badge from Acclaim/Credly, along with an account that can be used to verify your certification status.
The Cybersecurity course is comprised of the following 3 course modules, each of which has an estimated completion time of 10 hours:
Module 1: Fundamental Cybersecurity
Module 2: Advanced Cybersecurity
Module 3: Cybersecurity Lab
30 hours of Workbook Lessons & Exercises
Supporting Video Lessons
Course Completion Certificates & Badges
Certification Exam & Practice Questions
Feature-Rich eLearning Platform
Interactive Graded Exercises, Self-Test
Printable PDFs
Lifetime Access
Mind Map Poster
Symbol Legend Poster
Lab Exercise Booklet (if applicable)
This course module provides a comprehensive overview of DevOps practices, models and techniques, along with coverage of DevOps benefits, challenges and business and technology drivers. Also explained is how DevOps compares to traditional solution development and release approaches and how the application of DevOps can be monitored and measured for concrete business value.
Business Drivers of DevOps
IT Roles in DevOps Projects
Goals and Benefits of DevOps Adoption
Interoperability and Transparent Collaboration
Rapid Delivery, Responsive Scalability and Increased Reliability
Impacts and Challenges of DevOps Adoption
Automation, Measurement and Unified Metrics
DevOps Platform and Toolchain
The 20 Common DevOps Tools, Repositories and Systems
DevOps Lifecycle and Stages
Delivery Pipeline, Feedback Loop and Dark Launching
Continuous Integration (CI) and Continuous Delivery (CD)
Automated Builds and Automated Testing
Continuous Deployment and Automated Release Management
Dependency Management, Infrastructure Resource Staging and Compliance Verification
Introduction to IaC, PaC and CaC
This course module delves into the building blocks of cybersecurity solution environments and further explores the range of cyber threats that cybersecurity solutions can be designed to protect organizations from. Topics include cybersecurity technology mechanisms that represent the common components that comprise cybersecurity solutions, formal processes and procedures used to establish sound practices that utilize the mechanisms, as well as common cyber threats and attacks and how they can be mitigated using the previously described mechanisms and processes.
15 Cyber Security Mechanisms (including Honeypots, Biometric Scanners, Intrusion Detection, Malicious Code Analysis and User Behavior Analytics Systems)
9 Cybersecurity Monitoring Mechanisms (including Malware Monitors, Network Intrusion Monitors and Data Loss Protection Monitors)
13 Cybersecurity Processes (including Attack Surface Reduction, Continuous Vulnerability Management and Network Monitoring and Defense)
Insider Threat Detection and Incident Response Management
Cyber Threat Intelligence and Cyber Attack Motivations
13 Common Cyber Threats and Attacks (including Botnets, Tunneling and Remote Code Execution Attacks and 8 types of Malware)
Insider Threats, Social Engineering and Phishing
Advanced Persistent Threats (APTs)
This course module presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered in previous modules. Completing this lab will help highlight areas that require further attention and will help prove hands-on proficiency in Cybersecurity threats, practices and technologies, as they are utilized and combined to solve real-world problems.
Reading Exercise 3.1: ENO Bank Background
Lab Exercise 3.2: Data Breach
Lab Exercise 3.3: Hidden Malware
Optional Lab Exercise 3.4: Cybersecurity Processes
Optional Lab Exercise 3.5: Cybersecurity Metrics
Reading Exercise 3.6: ITI Background
Lab Exercise 3.7: Ransomware
Lab Exercise 3.8: Phishing
Lab Exercise 3.9: Cybersecurity Processes
Lab Exercise 3.10: Cybersecurity Metrics
Reading Exercise 3.11: Auto-Mech Background
Lab Exercise 3.12: Botnet and DoS
Lab Exercise 3.13: Software Exploit and SQL Injection
Optional Lab Exercise 3.14: Cybersecurity Processes
Optional Lab Exercise 3.15: Cybersecurity Metrics
Reading Exercise 3.16: Top Sector Financial (TSF) Background
Lab Exercise 3.17: Malicious Insider