What you'll learn..
-
Learn how to identify common cybersecurity threats, including malware, social engineering, breaches, and other attack vectors.
-
Explore physical security, environmental safeguards, and access control measures used to prevent unauthorized access and ensure business continuity.
-
Install software updates and patches, and apply authentication, encryption, and device-hardening techniques to protect sensitive information.
-
Apply cybersecurity best practices using strong password creation and management strategies, and identify use cases for encryption.
Skills you'll gain
Details to know
Shareable certificate
Add to your LinkedIn profile
Build your subject-matter expertise
This course is available as part of multiple programs When you enroll in this course, you'll also be asked to select a specific program.
-
Learn new concepts from industry experts
-
Gain a foundational understanding of a subject or tool
-
Develop job-relevant skills with hands-on projects
-
Earn a shareable career certificate
There are 4 modules in this course
Ready to build essential cybersecurity skills employers need? This beginner course introduces the foundational concepts, tools, and best practices used by cybersecurity professionals. During the course, you'll learn to identify common threats such as data theft, tampering, phishing, and malware. You'll discover how cyberattacks unfold and explore the physical, environmental, and access control measures used to secure devices and facilities. Plus, you'll develop strong digital hygiene habits using secure passwords, password management techniques, and multi-factor authentication, and understand the risks of password reuse, sharing, and default credentials. You'll also practice device hardening, use encryption tools, apply safe browsing techniques, and configure web browsers to minimize vulnerabilities. Hands-on labs provide practical experience, and a final project tests your proficiency across key cybersecurity topics.
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks typically include business interruptions or the theft, tampering, or destruction of sensitive information. Ransomware attacks are on the rise and are predicted to cost victims more than $265 billion (USD) annually by 2031. And that is just one type of threat we all need to protect against. In this module, you’ll explore physical security, environmental and access control measures, and various steps for physical incidents. You’ll gain insights on how to identify basic security threats and choose the best security practices to address those threats. You’ll also learn how to manage password and the risks of password reuse, sharing, and default credentials. This module will also cover how encryption is essential for data security and business continuity. Additionally, you’ll learn the difference between data, information, and insights and how companies leverage all three to help guide their business decisions. You’ll learn how to maintain data integrity and keep data confidential. You’ll also begin to learn about the different types of attacks and breaches that threaten today’s organizations and their data.
What's included ?
7 videos • Total 43 minutes
- Course Introduction 3 minutes
- Confidentiality, Integrity, and Availability 5 minutes
- Security and Information Privacy 8 minutes
- Threats and Breaches 7 minutes
- Microsoft Windows Server Lab Environment 2 minutes
- Threat Types 8 minutes
- Phishing, Social Engineering, and Other Attacks 6 minutes
4 readings • Total 19 minutes
- Course Overview 10 minutes
- Case Study 5 minutes
- Windows Defender Antivirus 3 minutes
- Summary & Highlights 1 minutes
2 assignments • Total 40 minutes
- Graded Quiz: Common Security Threats and Risks 30 minutes
- Practice Quiz: Common Security Threats and Risks 10 minutes
2 app items • Total 65 minutes
- Hands-on Lab: Windows Update 45 minutes
- Hands-on Lab: Windows Defender Antivirus 20 minutes
6 plugins • Total 50 minutes
- Activity: Exploring Information Privacy 5 minutes
- Reading: Intellectual Property and Types of Confidential Information 5 minutes
- Activity: Identifying an Attack 15 minutes
- Reading: Physical Security for Computing Devices 5 minutes
- Activity: Identifying Malware Threats 5 minutes
- Just for Fun - Hands-on Lab: Hacker Typer 15 minutes
Unfortunately, there’s no single solution for effective cybersecurity. The best practice is to use multiple layers of security. Some great first steps you can take to improve security and build a solid foundation to protect against cyberattacks are to use strong passwords, good password management, and multi-factor authentication. You should also limit access to data and resources to only those people who need them. Your security plan can be further rounded out and strengthened by using techniques such as device hardening, and encryption, and by educating employees about cyberthreats as a regular part of their training. This week, you’ll learn more about security, including password management, creating effective passwords, and securing devices. You’ll learn the differences between authentication, authorization, and accounting, and how these concepts help secure devices and validate logons. You’ll also learn how encryption can help secure data transmissions and how to manage email and spam.
What's included ?
7 videos • Total 42 minutes
- Password Management Techniques 5 minutes
- Authentication and SSO 4 minutes
- Security Threats: Access Control, Authorization, and Authentication 6 minutes
- Hardening Devices 8 minutes
- Security Threats: Validation and Device Usage 5 minutes
- Security Threats: Encryption Concepts 7 minutes
- Managing Email and Spam 4 minutes
2 readings • Total 4 minutes
- Firewalls 3 minutes
- Summary & Highlights 1 minutes
2 assignments • Total 40 minutes
- Graded Quiz: Security Best Practices 30 minutes
- Practice Quiz: Security Best Practices 10 minutes
2 app items • Total 105 minutes
- Hands-on Lab: Enforce Strong Password Policies 60 minutes
- Hands-on Lab: Windows Firewall with Advanced Security 45 minutes
3 plugins • Total 15 minutes
- Activity: Identifying Phishing Attempts 5 minutes
- Reading: Data continuity and Encryption 5 minutes
- Reading: Password Management 5 minutes
From people, to computers, to mobile phones, and the Internet of Things, everything is connected. Today there are more devices than people. For some, mobile phones and tablets have replaced traditional desktop computers and laptops. The web is where people and businesses get things done and it’s always on, 24 hours a day. The Internet can be an awesome place to go for entertainment, learning, and other online experiences. But the Internet isn’t safe. Hackers, phishing, identity theft, security leaks, privacy issues, and more are valid reasons to consistently practice safe browsing to protect yourself. This week, you will learn about safety concerns with applications and public browsing, including managing plug-ins, extensions, and toolbars. You will learn about web browser security configurations, cookies, and computer caches.
What's included ?
5 videos • Total 31 minutes
- Safe Browsing Practices: Application Ecosystem Security 6 minutes
- Safe Browsing Practices: Public Browsing Risks 6 minutes
- Safe Browsing Practices: Plug-ins, Extensions, and Toolbars 6 minutes
- Security Threats: Safe Browsing Techniques 6 minutes
- Virtual Private Networks 5 minutes
1 readings • Total 3 minutes
- Summary & Highlights 3 minutes
2 assignments • Total 40 minutes
- Graded Quiz: Safe Browsing Practices 30 minutes
- Practice Quiz: Safe Browsing Practices 10 minutes
1 app items • Total 60 minutes
- Hands-on Lab: Managing Browser Security and Privacy Settings 60 minutes
3 plugins • Total 15 minutes
- Activity: Identifying Phishing Attempts 5 minutes
- Reading: Data continuity and Encryption 5 minutes
- Reading: Password Management 5 minutes
In this module, you will explore major data breach case studies and gain insights into common data vulnerabilities. You will attempt a final quiz based on the previous three modules, followed by a final hands-on project where you will resolve three IT support tickets by troubleshooting Windows updates, clearing the browser cache, and configuring the Windows Defender Firewall in a Windows Server environment. Screenshots from the lab will be uploaded and evaluated by an AI grading tool.
What's included ?
3 readings • Total 14 minutes
- About this Project 10 minutes
- Congrats & Next Steps 3 minutes
- Thanks from the Course Team 1 minutes
1 assignments • Total 60 minutes
- Final Exam 60 minutes
2 app items • Total 120 minutes
- Hands-on Lab: Perform Final Project Tasks 60 minutes
- Final Project Submission and Evaluation 60 minutes
2 plugins • Total 23 minutes
- Case Study: Data Breach Yahoo! 8 minutes
- Glossary: Introduction to Cybersecurity Essentials 15 minutes