This course covers the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Participants will review multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to diminish potential cybersecurity problems.
This course is for anyone with none to three years of cybersecurity experience. Also, professionals with responsibility in the areas of audit, risk, compliance, information security, government and legal functions with a familiarity of basic IT/IS concepts who are new to cybersecurity or are interested in entering the field of cybersecurity.
Students taking this course should have a basic understanding of computers and the essentials of their operating systems.
Topics and Course Content
Foundation of Security
- Essential Terminologies
- Potential Losses Due to Security Attacks
Securing Operating Systems
- Threats to System Security
- Guidelines for Windows OS Security
Protecting System Using Antiviruses
- How Does Antivirus Software Work?
- Steps to Install Antivirus on Your Computer
Data Back UP
- Online Backup Service Providers
- Back Up the Data Using Windows Backup
Internet Security Settings
- Understanding Cookies
- Risks Involved Online
Securing Online Transactions
- Online Shopping
- Trustworthy and Untrustworthy Websites
Securing Email Communications
- Email Security Treats
- Email Security Procedures
Social Engineering and Identity Theft
- Protecting from Identity Theft
- What to Do if Identity is Stolen?
Security on Social Networking Sites
- Security Risks Involved in Social Networking Sites
- Facebook Privacy Settings
Securing Mobile Devices
- Mobile Device Security Risks
- Threats to Bluetooth Devices
Learning Goals and Results
At the conclusion of the course, the participants will be able to:
- Explain Information Assurance (IA) principles
- Identify the key parts of a cybersecurity network
- Describe risk management processes and practices as it applies to cybersecurity
- Identify security tools
- Distinguish system among the types security threats and vulnerabilities
- Describe different categories of attacks
- Define types of incidents including responses and timelines for response
- Analyze threats and risks within context of the cybersecurity
- Review cybersecurity incidents to apply appropriate response
- Evaluate decision making outcomes of cybersecurity scenarios
This class is 35 hours of classroom time taken in 3 1/2 – hour sessions over the course of 10 weeks.
Please Note: Course content and time investment can also be customized to an individual company’s needs.