Cybersecurity Foundations
Investigate cybersecurity threats and master techniques needed to protect your network.
GK# 9701
Investigate cybersecurity threats and master techniques needed to protect your network.
GK# 9701
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
I just took the Cybersecurity Foundations course through a virtual offering and it was fantastic. The instructor Brett Hanson was wonderful and really made the course super interesting, engaging, and personable. Even as someone who entered the course with a pretty well-rounded understanding of many of the topics covered, he still made the course worth while and a valuable investment of my time. He catered to students of all skill-levels which is not an easy thing to do! The week flew by I honestly forgot I was in class most of the time because the discussions were so interesting and consistent. This was my first time taking a Global Knowledge course and I was very impressed with the overall experience as well as the feasibility of navigating through the online learning platform and being able to easily access the virtual classroom environment. 5 stars for sure I highly recommend! I can't wait to take more courses if presented the opportunity.
Athena
Learn more about this topic. View the recorded webinar Remote Business – 5 Ms to Success.
Learn more about this topic. View the recorded webinar Trends in Cybersecurity.
1. Cybersecurity Awareness
2. Network Discovery
3. Systems Hardening
4. Security Architecture
5. Data Security
6. Public Key Infrastructure
7. Identity Management
8. Network Hardening
9. Malware
10. Social Engineering
11. Software Security
12. Environment Monitoring
13. Physical Security
14. Incident Response
15. Legal Considerations
16. Trends in Cybersecurity
17. Course Look Around
Lab 1: Explore HR Security
Lab 2: Interpret Scanning Results
Lab 3: Harden Servers and Workstations
Lab:4 Security Architecture
Lab 5: Protect Data
Lab 6: Configure a PKI
Lab 7: Manage Passwords
Lab 8: Explore Hardening Recommendations and Known Vulnerabilities
Lab 9: Detect Malware
Lab 10: Social Engineering
Lab 11: Privilege Escalation
Lab 12: Monitor a System
Lab 13: Implement Physical Security
Lab 14: Incident Response
Lab 15: Review Legal Considerations
TCP/IP Networking or equivalent knowledge
Any advanced or specialized security course, such as:
This course is available in the following formats:
Receive face-to-face instruction at one of our training center locations.
Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.
Train at your own pace with 24/7 access to courses that help you acquire must-have technology skills.
Experience the best of instructor-led training and the flexibility of on-demand learning.