- 0
- 2-3 hours worth of material
- Microsoft Learn
- English
Course Overview
- Module 1: Describe basic cybersecurity threats, attacks, and mitigations
- Define what is cybersecurity
- Describe the basic threat landscape
- Describe different types of Malware
- Describe basic mitigation strategies
- Module 2: Describe concepts of cryptography
- Describe some of the basic concepts of cryptography
- Describe encryption and is uses in cybersecurity
- Describe hashing and digital signing
- Describe the concept and use of digital certificates
- Module 3: Describe authentication and authorization in cybersecurity
- Define authentication
- Describe common authentication-based attacks
- Describe authorization security techniques
- Module 4: Describe basic networking concepts and how they relate to cybersecurity
- Describe the basics of networks
- Describe the threats to network security
- Describe ways to protect your network
- Describe ways to securely connect to and communicate over a network
- Module 5: Describe device-based threats and security controls
- Describe what your device knows about you
- Describe how devices and become cybersecurity threats
- Describe how to mitigate against device-related threats
- Module 6: Describe application-based threats and security controls
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
After completing this module, you will be able to:
After completing this module, you will be able to:
After completing this module, you will be able to:
Course Circullum
- Module 1: Describe basic cybersecurity threats, attacks, and mitigations
- Introduction
- Describe what is cybersecurity
- Describe the threat landscape
- Describe malware
- Describe basic mitigation strategies
- Knowledge check
- Summary and resources
- Module 2: Describe concepts of cryptography
- Introduction
- Describe cryptography
- Describe encryption and its use in cybersecurity
- Describe hashing and its application in digital signing
- Describe digital certificates
- Knowledge check
- Summary and resources
- Module 3: Describe authentication and authorization in cybersecurity
- Introduction
- Define authentication
- Describe authentication-based attacks
- Describe authorization security techniques
- Knowledge check
- Summary and resources
- Module 4: Describe network-based threats and mitigations
- Introduction
- Describe the different types of networks
- Describe how data moves around a network
- Describe threats to network security
- Protect your network
- Knowledge check
- Summary and resources
- Module 5: Describe device-based threats and security controls
- Introduction
- Describe what your device knows about you
- Describe how devices and become cybersecurity threats
- Describe how to mitigate against device related threats
- Knowledge check
- Summary and resources
- Module 6: Describe application-based threats and how to protect against them
- Introduction
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
- Knowledge check
- Summary and resources
Item Reviews - 3
Submit Reviews
This Course Include:
- Module 1: Describe basic cybersecurity threats, attacks, and mitigations
- Introduction
- Describe what is cybersecurity
- Describe the threat landscape
- Describe malware
- Describe basic mitigation strategies
- Knowledge check
- Summary and resources
- Module 2: Describe concepts of cryptography
- Introduction
- Describe cryptography
- Describe encryption and its use in cybersecurity
- Describe hashing and its application in digital signing
- Describe digital certificates
- Knowledge check
- Summary and resources
- Module 3: Describe authentication and authorization in cybersecurity
- Introduction
- Define authentication
- Describe authentication-based attacks
- Describe authorization security techniques
- Knowledge check
- Summary and resources
- Module 4: Describe network-based threats and mitigations
- Introduction
- Describe the different types of networks
- Describe how data moves around a network
- Describe threats to network security
- Protect your network
- Knowledge check
- Summary and resources
- Module 5: Describe device-based threats and security controls
- Introduction
- Describe what your device knows about you
- Describe how devices and become cybersecurity threats
- Describe how to mitigate against device related threats
- Knowledge check
- Summary and resources
- Module 6: Describe application-based threats and how to protect against them
- Introduction
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
- Knowledge check
- Summary and resources
- Provider:Microsoft Learn
- Certificate:Not Avalible
- Language:English
- Duration:2-3 hours worth of material
- Language CC: