Free Course:

Foundations of Cybersecurity

In this comprehensive course, participants will delve into the fundamental principles and practices of cybersecurity, equipping themselves with the knowledge and skills needed to defend digital systems and data against cyber threats. Through a structured curriculum, participants will explore the core concepts of cybersecurity, including threat identification, vulnerability assessment, and attack mitigation strategies. The course will cover essential topics such as risk management, access control mechanisms, encryption techniques, and identity and access management (IAM).

Throughout the program, participants will gain a deep understanding of the cybersecurity landscape, learning to recognize and address potential risks that could compromise the confidentiality, integrity, and availability of information. They will explore real-world case studies and scenarios to apply theoretical knowledge to practical situations, developing critical thinking and problem-solving skills essential for effective cybersecurity practices.

About This Course

Key components of the course include:

  • Understanding the nature of cyber threats, vulnerabilities, and attacks.
  • Implementing risk management strategies to prioritize and mitigate potential risks.
  • Utilizing access control mechanisms to control and monitor access to digital resources.
  • Employing encryption techniques to protect sensitive data from unauthorized access or tampering.
  • Managing digital identities and access privileges through identity and access management (IAM) solutions.
  • By the end of this course, participants will emerge with a solid foundation in cybersecurity principles and best practices, prepared to contribute to the security posture of their organizations and navigate the evolving cybersecurity landscape with confidence.

Explore the Mysteries of Cybersecurity

  • Master Needed Cybersecurity Knowledge and Skills for IT Certification Tests
  • Learn Foundational Knowledge to Accelerate Network and IT Training
  • Accelerate Your IT Career

Learn it Right, Learn it Well, and Reap the Rewards

Spending the time now to fully understand the core information of cybersecurity principles will help create a strong foundation to build off of.

Module Descriptions

Welcome and Getting Started: Prepare yourself for efficiently and successfully completing the course. You’ll get an overview of what the course is all about and what you should expect out of it.

Defining Cybersecurity: This module introduces the fundamental concepts of cybersecurity, exploring its definition, scope, and importance in protecting digital assets from unauthorized access, breaches, and disruptions.

Threats to Security: Participants will examine various types of cyber threats, including malware, phishing attacks, and denial-of-service (DoS) attacks, gaining insights into how these threats can compromise the security of systems and data.

Protecting Against Threats: This module focuses on strategies and measures to mitigate cyber threats.

Identity and Access Management: Participants will learn about the principles and practices of identity and access management (IAM), including authentication, authorization, and access control mechanisms, to manage digital identities and control access to resources effectively.

Confidentiality: Exploring the concept of confidentiality, this module covers encryption techniques, data classification, and access controls to ensure that sensitive information remains protected from unauthorized disclosure.

Integrity: This module focuses on maintaining data integrity, covering methods such as digital signatures and database integrity mechanisms.

Availability: Exploring the importance of availability in cybersecurity, this module covers strategies such as redundancy, fault tolerance, and disaster recovery to ensure that systems and data remain accessible and operational even in the face of disruptions or failures.

Securing Your Network: Participants will learn about network security principles and best practices, including implementing secure configurations, segmenting networks, and monitoring network traffic to protect against unauthorized access and cyber threats.

Wrap Up: Time to wrap up the course and provide any final thoughts.

How to Take This Course!

Option #1 – Watch this course on YouTube. For convenience, I’ve included links to the videos down below

Option #2 – Take this course on Udemy. This is not a free option, but has the advantage of a full learning management system, no commercials, and completion certificates.

Here’s the link to the Udemy Course:

https://www.udemy.com/course/foundations-of-cybersecurity/?referralCode=479D43C9779EAFBAA8E4

 

Course Content

Module 0 – Welcome and Getting Started

Welcome https://youtu.be/GvIDcpDdVHk 0:01:33
Course Overview https://youtu.be/vw8_8a9O99w 0:07:39
Syllabus N/A
Meet Your Instructor N/A

 

Module 1 – Defining Cybersecurity

Module Intro https://youtu.be/eLC55LrbJbE 0:01:25
What is Cybersecurity https://youtu.be/SAGAoURA41Q 0:07:13
The CIA Triad https://youtu.be/g_7ts5R8rSk 0:06:36
Cyber Incident Impact https://youtu.be/XrHbJv40lA8 0:05:39
Key Cybersecurity Concepts https://youtu.be/A2eCQeY9_zY 0:07:41
Cybersecurity Cube https://youtu.be/LahbvX039zc 0:07:50

 

Module 2 – Threats to Security

Module Intro https://youtu.be/OPeY4hMYPlI 0:01:28
Threat Agents https://youtu.be/r5dlRIiQ1Zc 0:14:20
Common Attack Vectors https://youtu.be/OxAOylCCiP4 0:10:29
Common Vulnerabilities https://youtu.be/d_t2QRzZbIA 0:06:41
Common Equipment Vulnerabilities https://youtu.be/knm2Lh3L7PE 0:09:06
Common Software Vulnerabilities https://youtu.be/H9klVYt7sXE 0:10:31
Race Conditions https://youtu.be/mq59FxItJ2w 0:09:09
Social Engineering Techniques https://youtu.be/VlEOJcc_Wcc 0:10:48
How Passwords are Hacked https://youtu.be/3MVmZLOhky8 0:11:15
Malware https://youtu.be/w24NK4BWTW4 0:13:37
Common Network Attacks https://youtu.be/KjnaE0AnQ5Q 0:14:10

 

Module 3 – Protecting Against Threats

Module Intro https://youtu.be/BDTGOpdajyU 0:02:07
Protecting a Cybersecurity Domain https://youtu.be/bA9teHvqufI 0:06:48
What is a Cybersecurity Program https://youtu.be/gDwPN559ZCU 0:08:03
Policies, Standards, Procedures, Guidelines, and Controls https://youtu.be/gazZ3lyQsRo 0:12:35
Types of Controls https://youtu.be/6__cew2fQHQ 0:05:10
What is a Security Frameworks https://youtu.be/AedAu3LC4e4 0:07:29
Risk Management https://youtu.be/dSimIA1kVKA 0:06:21
Cybersecurity Lifecycles https://youtu.be/7pcH25rpHnI 0:02:57
Basic Security Principles https://youtu.be/y8XR9JcGIMM 0:06:06

 

Module 4 – Identity and Access Management (IAM)

Module Intro https://youtu.be/81c72t36EEo 0:01:26
Identity and Access Management https://youtu.be/3SvGygX4zEw 0:04:52
Authentication, Authorization, Accounting (AAA) https://youtu.be/zuVCyNRC4ag 0:03:30
Password Habits https://youtu.be/89VBdWbcWqc 0:23:57
Multi-Factor Authentication https://youtu.be/rtPF6EsLslU 0:04:07
Password Enforcement https://youtu.be/I2rlJIPd31U 0:06:18
Federation https://youtu.be/0hR3ZlIBc8M 0:05:36
Access Control https://youtu.be/y8ZSXa8nl2Q 0:13:18
Access Control Models https://youtu.be/Z0bUndO65Jo 0:09:32
Physical Access Control https://youtu.be/82tRGGy8zI0 0:06:29

 

Module 5 – Confidentiality

Module Intro https://youtu.be/HmonDZjRByo 0:03:03
Confidentiality https://youtu.be/Jtg7LI91bpg 0:10:06
Data Lifecycle https://youtu.be/y1W_9qXqoCY 0:09:22
Encrypting Data https://youtu.be/iv4aDRfEGk8 0:03:30
Data Management https://youtu.be/W7Vz9B1NWtQ 0:07:46
Steganography https://youtu.be/RG3sUj1hnwE 0:05:00
Data Obfuscation https://youtu.be/egABOKi0ncw 0:07:54

 

Module 6 – Integrity

Module Intro https://youtu.be/lfu8IjJtW44 0:01:13
Integrity https://youtu.be/k169OWDoRco 0:05:31
PKI and Digital Certificates https://youtu.be/BVs0Ccc_Tpw 0:09:27
Digital Signatures https://youtu.be/49EzgMDmjQM 0:04:36
Database Integrity https://youtu.be/uqXp34glmhU 0:13:06

 

Module 7 – Availability

Module Intro https://youtu.be/zTIRSg3Zb7M 0:02:09
High Availability (HA) https://youtu.be/gbBD0xFgTG0 0:10:35
Measuring Availability, Five 9’s, and SLAs https://youtu.be/n7Pc9DRC2Dc 0:06:52
Redundancy https://youtu.be/5MzcR0R2DGc 0:15:47
Replication https://youtu.be/PodFOD2z9U0 0:06:31
Incident Response https://youtu.be/0sTyAvSCN5Y 0:06:29
Disaster Recovery https://youtu.be/C0bsmlvgaSU 0:10:56
RPO and RTO https://youtu.be/lQGEQ2fFoqw 0:05:30
Backups https://youtu.be/U-AJ8o-OBm4 0:16:35
Backup Types https://youtu.be/rWCVEcHmweQ 0:10:04
Database Backups https://youtu.be/YJGnMIFjdOc 0:04:03

 

Module 8 – Securing Your Network

Module Intro https://youtu.be/bz5O_1JIVn4 0:02:22
Physical Security https://youtu.be/vcEYI6QaIYo 0:10:17
Network Security https://youtu.be/lFih7D6s8cQ 0:14:39
Firewalls https://youtu.be/tmUIEQmRXvQ 0:06:44
Remote access https://youtu.be/gHu9ner7kkE 0:12:24
Equipment Hardening https://youtu.be/Ubmi8MRDv00 0:05:01
Host-Based Security https://youtu.be/Lfy6EvrP3Y8 0:11:32

 

Module X – Wrap Up

Review https://youtu.be/U_l6CXddSKw 0:03:27
Course Wrap Up https://youtu.be/ze1VSTWAH5o 0:02:24

 

Help the Effort

Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and recieved very little in return. Please consider helping keep the effort going by one of the following: