Describe the basic concepts of cybersecurity

Created By
Microsoft via Microsoft Learn
  • 0
  • 2-3 hours worth of material
  • Microsoft Learn
  • English
Describe the basic concepts of cybersecurity

Course Overview

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
  • After completing this module, you will be able to:

    • Define what is cybersecurity
    • Describe the basic threat landscape
    • Describe different types of Malware
    • Describe basic mitigation strategies
  • Module 2: Describe concepts of cryptography
  • After completing this module, you will be able to:

    • Describe some of the basic concepts of cryptography
    • Describe encryption and is uses in cybersecurity
    • Describe hashing and digital signing
    • Describe the concept and use of digital certificates
  • Module 3: Describe authentication and authorization in cybersecurity
  • After completing this module, you will be able to:

    • Define authentication
    • Describe common authentication-based attacks
    • Describe authorization security techniques
  • Module 4: Describe basic networking concepts and how they relate to cybersecurity
    • Describe the basics of networks
    • Describe the threats to network security
    • Describe ways to protect your network
    • Describe ways to securely connect to and communicate over a network
  • Module 5: Describe device-based threats and security controls
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device-related threats
  • Module 6: Describe application-based threats and security controls
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications

Course Circullum

  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
    • Introduction
    • Describe what is cybersecurity
    • Describe the threat landscape
    • Describe malware
    • Describe basic mitigation strategies
    • Knowledge check
    • Summary and resources
  • Module 2: Describe concepts of cryptography
    • Introduction
    • Describe cryptography
    • Describe encryption and its use in cybersecurity
    • Describe hashing and its application in digital signing
    • Describe digital certificates
    • Knowledge check
    • Summary and resources
  • Module 3: Describe authentication and authorization in cybersecurity
    • Introduction
    • Define authentication
    • Describe authentication-based attacks
    • Describe authorization security techniques
    • Knowledge check
    • Summary and resources
  • Module 4: Describe network-based threats and mitigations
    • Introduction
    • Describe the different types of networks
    • Describe how data moves around a network
    • Describe threats to network security
    • Protect your network
    • Knowledge check
    • Summary and resources
  • Module 5: Describe device-based threats and security controls
    • Introduction
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device related threats
    • Knowledge check
    • Summary and resources
  • Module 6: Describe application-based threats and how to protect against them
    • Introduction
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications
    • Knowledge check
    • Summary and resources

out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Online Course

This Course Include:
  • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
    • Introduction
    • Describe what is cybersecurity
    • Describe the threat landscape
    • Describe malware
    • Describe basic mitigation strategies
    • Knowledge check
    • Summary and resources
  • Module 2: Describe concepts of cryptography
    • Introduction
    • Describe cryptography
    • Describe encryption and its use in cybersecurity
    • Describe hashing and its application in digital signing
    • Describe digital certificates
    • Knowledge check
    • Summary and resources
  • Module 3: Describe authentication and authorization in cybersecurity
    • Introduction
    • Define authentication
    • Describe authentication-based attacks
    • Describe authorization security techniques
    • Knowledge check
    • Summary and resources
  • Module 4: Describe network-based threats and mitigations
    • Introduction
    • Describe the different types of networks
    • Describe how data moves around a network
    • Describe threats to network security
    • Protect your network
    • Knowledge check
    • Summary and resources
  • Module 5: Describe device-based threats and security controls
    • Introduction
    • Describe what your device knows about you
    • Describe how devices and become cybersecurity threats
    • Describe how to mitigate against device related threats
    • Knowledge check
    • Summary and resources
  • Module 6: Describe application-based threats and how to protect against them
    • Introduction
    • Describe what are applications
    • Describe the threat landscape of applications
    • Describe how to protect your applications
    • Knowledge check
    • Summary and resources
  • Provider:Microsoft Learn
  • Certificate:Not Avalible
  • Language:English
  • Duration:2-3 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today