Cybersecurity Fundamentals With Certificate Of Completion
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.07 GB | Duration: 1h 32m
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.07 GB | Duration: 1h 32m
Build a Strong Cybersecurity Foundation: Master Threat Detection, Malware Analysis, Risk Mitigation & Compliance
What you'll learn
Identify, assess, and address cyber risks.
Strategies for risk mitigation and treatment
Creating and implementing an Incident Response Plan
Data classification, retention, and secure destruction methods
Understand the CIA Triad
Physical, technical, and administrative security controls
Access Control Mechanisms
Building a culture of cybersecurity awareness within teams
Requirements
Access to a computer or laptop with internet connectivity
No prior cybersecurity experience needed
A willingness to learn
Description
Understand the core principles of cybersecurity in this essential course designed to help you protect your digital life and business from today’s evolving threats. Created by cybersecurity expert Atika, this course breaks down complex topics into clear, actionable insights that anyone—from beginners to professionals—can apply in real-world situations.You'll start by mastering foundational concepts such as the CIA Triad (Confidentiality, Integrity, and Availability), risk management, and incident response. From there, you’ll dive deeper into access controls, including Role-Based Access Control (RBAC) and the Principle of Least Privilege, to ensure secure system design. Learn how to develop robust business continuity plans, defend against common attack vectors, and secure networks with firewalls, intrusion detection systems, and endpoint protection tools.The course also explores the importance of cloud security, security operations, and data protection in the age of remote work. You’ll build awareness around social engineering attacks like phishing and pretexting and learn how to foster a security-first culture through training and awareness.Whether you're an aspiring IT professional or a business owner looking to strengthen your cyber defenses, this course equips you with the knowledge and confidence to proactively manage and reduce digital risks. Earn a certificate of completion and take your first step into the world of cybersecurity.
Overview
Section 1: Welcome to Cybersecurity Fundamentals
Lecture 1 Training Overview
Lecture 2 Introduction
Section 2: Chapter 1
Lecture 3 Security Principles Overview
Lecture 4 What is CIA Triad
Lecture 5 What is Risk Management
Lecture 6 What are Security Controls?
Section 3: Chapter 2
Lecture 7 Incident Response, Business Continuity & Disaster
Lecture 8 What is Incident Response
Lecture 9 Understanding Business Continuity
Lecture 10 What Are The Components Of A Disaster Recovery Plan
Section 4: Chapter 3
Lecture 11 Access Control Concepts Overview
Lecture 12 Defining Security Control, Subject, Object, and Rule
Lecture 13 Identifying Controls Assessments and Defense in Depth 1
Lecture 14 Principle of Least Privilege and Privileged Accounts
Lecture 15 Segregation Of Duties
Lecture 16 Two-Person Integrity
Lecture 17 What is Physical Security and Types of Physical Access Control
Lecture 18 What are Logical and Role-Based Access Controls
Section 5: Chapter 4
Lecture 19 Network Security Overview
Lecture 20 What is Networking
Lecture 21 What are the Different Types Of Threats
Lecture 22 Understanding the On-Premises Data Centers
Lecture 23 What is Cloud Computing
Section 6: Chapter 5
Lecture 24 Security Operations Overview
Lecture 25 What is Data Handling
Lecture 26 Logging and Monitoring Security Events
Lecture 27 What is Security Awareness Training
Section 7: Cybersecurity Self-Assessment
Anyone who uses the internet and wants to stay safe in today’s digital world,Business owners and entrepreneurs who want to protect their company from cyber threats,Professionals and job seekers looking to build a strong foundation in cybersecurity,Team leaders and managers responsible for overseeing IT, compliance, or risk management