Description
Audience Profile
This course is intended for both novice and experienced IT professionals who want to explore the nature of cybersecurity and obtain a basic understanding of the current state of cybersecurity and the strategies that can help strengthen an organization’s security perimeter.
At Course Completion
After completing this course, students will be able to:
- Understand and describe the cybersecurity landscape.
- Discuss how encryption works, and understand its broader uses in protecting your data.
- Describe the differences between authentication and authorization.
- Describe different network types, the network threat landscape, and how to protect them from cyberattacks.
- Understand what a device is, how much a device knows about you, and how to reduce possible threats.
- Understand how applications can be exploited to gain access to your data and assets.
- Describe the benefits of using a Zero Trust strategy to protect an organization’s digital estate.
Prerequisites
- Basic awareness of IT, devices, and applications