- Describe basic cybersecurity threats, attacks, and mitigations.
After completing this module, you'll be able to:
- Define what is cybersecurity.
- Describe the basic threat landscape.
- Describe different types of Malware.
- Describe basic mitigation strategies.
- Describe concepts of cryptography.
After completing this module, you'll be able to:
- Describe some of the basic concepts of cryptography.
- Describe encryption and is uses in cybersecurity.
- Describe hashing and digital signing.
- Describe the concept and use of digital certificates.
- Describe authentication and authorization in cybersecurity.
After completing this module, you'll be able to:
- Define authentication.
- Describe common authentication-based attacks.
- Describe authorization security techniques.
- Describe basic networking concepts and how they relate to cybersecurity.
- Describe the basics of networks.
- Describe the threats to network security.
- Describe ways to protect your network.
- Describe ways to securely connect to and communicate over a network.
- Describe device-based threats and security controls.
- Describe what your device knows about you.
- Describe how devices and become cybersecurity threats.
- Describe how to mitigate against device-related threats.
- Describe application-based threats and security controls.
- Describe what are applications.
- Describe the threat landscape of applications.
- Describe how to protect your applications.
Our career paths help you become job ready faster
Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Describe basic cybersecurity threats, attacks, and mitigations
- Introduction
- Describe what is cybersecurity
- Describe the threat landscape
- Describe malware
- Describe basic mitigation strategies
- Module assessment
- Summary and resources
- Describe concepts of cryptography
- Introduction
- Describe cryptography
- Describe encryption and its use in cybersecurity
- Describe hashing and its application in digital signing
- Describe digital certificates
- Module assessment
- Summary and resources
- Describe authentication and authorization in cybersecurity
- Introduction
- Define authentication
- Describe authentication-based attacks
- Describe authorization security techniques
- Module assessment
- Summary and resources
- Describe network-based threats and mitigations
- Introduction
- Describe the different types of networks
- Describe how data moves around a network
- Describe threats to network security
- Protect your network
- Module assessment
- Summary and resources
- Describe device-based threats and security controls
- Introduction
- Describe what your device knows about you
- Describe how devices become cybersecurity threats
- Describe how to mitigate against device-related threats
- Module assessment
- Summary and resources
- Describe application-based threats and how to protect against them
- Introduction
- Describe what are applications
- Describe the threat landscape of applications
- Describe how to protect your applications
- Module assessment
- Summary and resources