Courses

Cybersecurity

Cybersecurity

Certified Cybersecurity Specialist

The Cybersecurity course develops an understanding of common cybersecurity threats and vulnerabilities and further develops skills in the technologies and practices used to prevent and counter cyber-attacks.

It establishes a set of mechanisms that represent the common components that comprise cybersecurity solutions.

Upon completing the course you will receive a digital certificate of completion, as well as a digital training badge from Acclaim/Credly. Upon getting certified you will also receive an official Cybersecurity Specialist digital accreditation certificate and certification badge from Acclaim/Credly, along with an account that can be used to verify your certification status.

Learning objectives

The Cybersecurity course is comprised of the following 3 course modules, each of which has an estimated completion time of 10 hours:

Module 1: Fundamental Cybersecurity

Module 2: Advanced Cybersecurity

Module 3: Cybersecurity Lab

Educational approach

30 hours of Workbook Lessons & Exercises

Supporting Video Lessons

Course Completion Certificates & Badges

Certification Exam & Practice Questions

Feature-Rich eLearning Platform

Interactive Graded Exercises, Self-Test

Printable PDFs

Lifetime Access

Mind Map Poster

Symbol Legend Poster

Lab Exercise Booklet (if applicable)

Enroll in this course

Buy now
Module 1: Fundamental Cybersecurity

This course module provides a comprehensive overview of DevOps practices, models and techniques, along with coverage of DevOps benefits, challenges and business and technology drivers. Also explained is how DevOps compares to traditional solution development and release approaches and how the application of DevOps can be monitored and measured for concrete business value.

Business Drivers of DevOps

IT Roles in DevOps Projects

Goals and Benefits of DevOps Adoption

Interoperability and Transparent Collaboration

Rapid Delivery, Responsive Scalability and Increased Reliability

Impacts and Challenges of DevOps Adoption

Automation, Measurement and Unified Metrics

DevOps Platform and Toolchain

The 20 Common DevOps Tools, Repositories and Systems

DevOps Lifecycle and Stages

Delivery Pipeline, Feedback Loop and Dark Launching

Continuous Integration (CI) and Continuous Delivery (CD)

Automated Builds and Automated Testing

Continuous Deployment and Automated Release Management

Dependency Management, Infrastructure Resource Staging and Compliance Verification

Introduction to IaC, PaC and CaC

Module 2: Advanced Cybersecurity

This course module delves into the building blocks of cybersecurity solution environments and further explores the range of cyber threats that cybersecurity solutions can be designed to protect organizations from. Topics include cybersecurity technology mechanisms that represent the common components that comprise cybersecurity solutions, formal processes and procedures used to establish sound practices that utilize the mechanisms, as well as common cyber threats and attacks and how they can be mitigated using the previously described mechanisms and processes.

15 Cyber Security Mechanisms (including Honeypots, Biometric Scanners, Intrusion Detection, Malicious Code Analysis and User Behavior Analytics Systems)

9 Cybersecurity Monitoring Mechanisms (including Malware Monitors, Network Intrusion Monitors and Data Loss Protection Monitors)

13 Cybersecurity Processes (including Attack Surface Reduction, Continuous Vulnerability Management and Network Monitoring and Defense)

Insider Threat Detection and Incident Response Management

Cyber Threat Intelligence and Cyber Attack Motivations

13 Common Cyber Threats and Attacks (including Botnets, Tunneling and Remote Code Execution Attacks and 8 types of Malware)

Insider Threats, Social Engineering and Phishing

Advanced Persistent Threats (APTs)

Module 3: Cybersecurity Lab

This course module presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered in previous modules. Completing this lab will help highlight areas that require further attention and will help prove hands-on proficiency in Cybersecurity threats, practices and technologies, as they are utilized and combined to solve real-world problems.

Reading Exercise 3.1: ENO Bank Background

Lab Exercise 3.2: Data Breach

Lab Exercise 3.3: Hidden Malware

Optional Lab Exercise 3.4: Cybersecurity Processes

Optional Lab Exercise 3.5: Cybersecurity Metrics

Reading Exercise 3.6: ITI Background

Lab Exercise 3.7: Ransomware

Lab Exercise 3.8: Phishing

Lab Exercise 3.9: Cybersecurity Processes

Lab Exercise 3.10: Cybersecurity Metrics

Reading Exercise 3.11: Auto-Mech Background

Lab Exercise 3.12: Botnet and DoS

Lab Exercise 3.13: Software Exploit and SQL Injection

Optional Lab Exercise 3.14: Cybersecurity Processes

Optional Lab Exercise 3.15: Cybersecurity Metrics

Reading Exercise 3.16: Top Sector Financial (TSF) Background

Lab Exercise 3.17: Malicious Insider

Hear from professionals we’ve trained