Free Course:
Foundations of Cybersecurity
In this comprehensive course, participants will delve into the fundamental principles and practices of cybersecurity, equipping themselves with the knowledge and skills needed to defend digital systems and data against cyber threats. Through a structured curriculum, participants will explore the core concepts of cybersecurity, including threat identification, vulnerability assessment, and attack mitigation strategies. The course will cover essential topics such as risk management, access control mechanisms, encryption techniques, and identity and access management (IAM).
Throughout the program, participants will gain a deep understanding of the cybersecurity landscape, learning to recognize and address potential risks that could compromise the confidentiality, integrity, and availability of information. They will explore real-world case studies and scenarios to apply theoretical knowledge to practical situations, developing critical thinking and problem-solving skills essential for effective cybersecurity practices.
About This Course
Key components of the course include:
- Understanding the nature of cyber threats, vulnerabilities, and attacks.
- Implementing risk management strategies to prioritize and mitigate potential risks.
- Utilizing access control mechanisms to control and monitor access to digital resources.
- Employing encryption techniques to protect sensitive data from unauthorized access or tampering.
- Managing digital identities and access privileges through identity and access management (IAM) solutions.
- By the end of this course, participants will emerge with a solid foundation in cybersecurity principles and best practices, prepared to contribute to the security posture of their organizations and navigate the evolving cybersecurity landscape with confidence.
Explore the Mysteries of Cybersecurity
- Master Needed Cybersecurity Knowledge and Skills for IT Certification Tests
- Learn Foundational Knowledge to Accelerate Network and IT Training
- Accelerate Your IT Career
Learn it Right, Learn it Well, and Reap the Rewards
Spending the time now to fully understand the core information of cybersecurity principles will help create a strong foundation to build off of.
Module Descriptions
Welcome and Getting Started: Prepare yourself for efficiently and successfully completing the course. You’ll get an overview of what the course is all about and what you should expect out of it.
Defining Cybersecurity: This module introduces the fundamental concepts of cybersecurity, exploring its definition, scope, and importance in protecting digital assets from unauthorized access, breaches, and disruptions.
Threats to Security: Participants will examine various types of cyber threats, including malware, phishing attacks, and denial-of-service (DoS) attacks, gaining insights into how these threats can compromise the security of systems and data.
Protecting Against Threats: This module focuses on strategies and measures to mitigate cyber threats.
Identity and Access Management: Participants will learn about the principles and practices of identity and access management (IAM), including authentication, authorization, and access control mechanisms, to manage digital identities and control access to resources effectively.
Confidentiality: Exploring the concept of confidentiality, this module covers encryption techniques, data classification, and access controls to ensure that sensitive information remains protected from unauthorized disclosure.
Integrity: This module focuses on maintaining data integrity, covering methods such as digital signatures and database integrity mechanisms.
Availability: Exploring the importance of availability in cybersecurity, this module covers strategies such as redundancy, fault tolerance, and disaster recovery to ensure that systems and data remain accessible and operational even in the face of disruptions or failures.
Securing Your Network: Participants will learn about network security principles and best practices, including implementing secure configurations, segmenting networks, and monitoring network traffic to protect against unauthorized access and cyber threats.
Wrap Up: Time to wrap up the course and provide any final thoughts.
How to Take This Course!
Option #1 – Watch this course on YouTube. For convenience, I’ve included links to the videos down below
Option #2 – Take this course on Udemy. This is not a free option, but has the advantage of a full learning management system, no commercials, and completion certificates.
Here’s the link to the Udemy Course:
https://www.udemy.com/course/foundations-of-cybersecurity/?referralCode=479D43C9779EAFBAA8E4
Course Content
Module 0 – Welcome and Getting Started
Welcome | https://youtu.be/GvIDcpDdVHk | 0:01:33 |
Course Overview | https://youtu.be/vw8_8a9O99w | 0:07:39 |
Syllabus | N/A | |
Meet Your Instructor | N/A |
Module 1 – Defining Cybersecurity
Module Intro | https://youtu.be/eLC55LrbJbE | 0:01:25 |
What is Cybersecurity | https://youtu.be/SAGAoURA41Q | 0:07:13 |
The CIA Triad | https://youtu.be/g_7ts5R8rSk | 0:06:36 |
Cyber Incident Impact | https://youtu.be/XrHbJv40lA8 | 0:05:39 |
Key Cybersecurity Concepts | https://youtu.be/A2eCQeY9_zY | 0:07:41 |
Cybersecurity Cube | https://youtu.be/LahbvX039zc | 0:07:50 |
Module 2 – Threats to Security
Module Intro | https://youtu.be/OPeY4hMYPlI | 0:01:28 |
Threat Agents | https://youtu.be/r5dlRIiQ1Zc | 0:14:20 |
Common Attack Vectors | https://youtu.be/OxAOylCCiP4 | 0:10:29 |
Common Vulnerabilities | https://youtu.be/d_t2QRzZbIA | 0:06:41 |
Common Equipment Vulnerabilities | https://youtu.be/knm2Lh3L7PE | 0:09:06 |
Common Software Vulnerabilities | https://youtu.be/H9klVYt7sXE | 0:10:31 |
Race Conditions | https://youtu.be/mq59FxItJ2w | 0:09:09 |
Social Engineering Techniques | https://youtu.be/VlEOJcc_Wcc | 0:10:48 |
How Passwords are Hacked | https://youtu.be/3MVmZLOhky8 | 0:11:15 |
Malware | https://youtu.be/w24NK4BWTW4 | 0:13:37 |
Common Network Attacks | https://youtu.be/KjnaE0AnQ5Q | 0:14:10 |
Module 3 – Protecting Against Threats
Module Intro | https://youtu.be/BDTGOpdajyU | 0:02:07 |
Protecting a Cybersecurity Domain | https://youtu.be/bA9teHvqufI | 0:06:48 |
What is a Cybersecurity Program | https://youtu.be/gDwPN559ZCU | 0:08:03 |
Policies, Standards, Procedures, Guidelines, and Controls | https://youtu.be/gazZ3lyQsRo | 0:12:35 |
Types of Controls | https://youtu.be/6__cew2fQHQ | 0:05:10 |
What is a Security Frameworks | https://youtu.be/AedAu3LC4e4 | 0:07:29 |
Risk Management | https://youtu.be/dSimIA1kVKA | 0:06:21 |
Cybersecurity Lifecycles | https://youtu.be/7pcH25rpHnI | 0:02:57 |
Basic Security Principles | https://youtu.be/y8XR9JcGIMM | 0:06:06 |
Module 4 – Identity and Access Management (IAM)
Module Intro | https://youtu.be/81c72t36EEo | 0:01:26 |
Identity and Access Management | https://youtu.be/3SvGygX4zEw | 0:04:52 |
Authentication, Authorization, Accounting (AAA) | https://youtu.be/zuVCyNRC4ag | 0:03:30 |
Password Habits | https://youtu.be/89VBdWbcWqc | 0:23:57 |
Multi-Factor Authentication | https://youtu.be/rtPF6EsLslU | 0:04:07 |
Password Enforcement | https://youtu.be/I2rlJIPd31U | 0:06:18 |
Federation | https://youtu.be/0hR3ZlIBc8M | 0:05:36 |
Access Control | https://youtu.be/y8ZSXa8nl2Q | 0:13:18 |
Access Control Models | https://youtu.be/Z0bUndO65Jo | 0:09:32 |
Physical Access Control | https://youtu.be/82tRGGy8zI0 | 0:06:29 |
Module 5 – Confidentiality
Module Intro | https://youtu.be/HmonDZjRByo | 0:03:03 |
Confidentiality | https://youtu.be/Jtg7LI91bpg | 0:10:06 |
Data Lifecycle | https://youtu.be/y1W_9qXqoCY | 0:09:22 |
Encrypting Data | https://youtu.be/iv4aDRfEGk8 | 0:03:30 |
Data Management | https://youtu.be/W7Vz9B1NWtQ | 0:07:46 |
Steganography | https://youtu.be/RG3sUj1hnwE | 0:05:00 |
Data Obfuscation | https://youtu.be/egABOKi0ncw | 0:07:54 |
Module 6 – Integrity
Module Intro | https://youtu.be/lfu8IjJtW44 | 0:01:13 |
Integrity | https://youtu.be/k169OWDoRco | 0:05:31 |
PKI and Digital Certificates | https://youtu.be/BVs0Ccc_Tpw | 0:09:27 |
Digital Signatures | https://youtu.be/49EzgMDmjQM | 0:04:36 |
Database Integrity | https://youtu.be/uqXp34glmhU | 0:13:06 |
Module 7 – Availability
Module Intro | https://youtu.be/zTIRSg3Zb7M | 0:02:09 |
High Availability (HA) | https://youtu.be/gbBD0xFgTG0 | 0:10:35 |
Measuring Availability, Five 9’s, and SLAs | https://youtu.be/n7Pc9DRC2Dc | 0:06:52 |
Redundancy | https://youtu.be/5MzcR0R2DGc | 0:15:47 |
Replication | https://youtu.be/PodFOD2z9U0 | 0:06:31 |
Incident Response | https://youtu.be/0sTyAvSCN5Y | 0:06:29 |
Disaster Recovery | https://youtu.be/C0bsmlvgaSU | 0:10:56 |
RPO and RTO | https://youtu.be/lQGEQ2fFoqw | 0:05:30 |
Backups | https://youtu.be/U-AJ8o-OBm4 | 0:16:35 |
Backup Types | https://youtu.be/rWCVEcHmweQ | 0:10:04 |
Database Backups | https://youtu.be/YJGnMIFjdOc | 0:04:03 |
Module 8 – Securing Your Network
Module Intro | https://youtu.be/bz5O_1JIVn4 | 0:02:22 |
Physical Security | https://youtu.be/vcEYI6QaIYo | 0:10:17 |
Network Security | https://youtu.be/lFih7D6s8cQ | 0:14:39 |
Firewalls | https://youtu.be/tmUIEQmRXvQ | 0:06:44 |
Remote access | https://youtu.be/gHu9ner7kkE | 0:12:24 |
Equipment Hardening | https://youtu.be/Ubmi8MRDv00 | 0:05:01 |
Host-Based Security | https://youtu.be/Lfy6EvrP3Y8 | 0:11:32 |
Module X – Wrap Up
Review | https://youtu.be/U_l6CXddSKw | 0:03:27 |
Course Wrap Up | https://youtu.be/ze1VSTWAH5o | 0:02:24 |
Help the Effort
Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and recieved very little in return. Please consider helping keep the effort going by one of the following:
- Donate to the cause: buymeacoffee.com/techknowsurge
- Buy TechKnowSurge merch: https://techknowsurge.myspreadshop.com/
- Like and comment on any YouTube videos you watch
- Subscribe to my channel: https://www.youtube.com/@TechKnowSurge?sub_confirmation=1
- Let me know if there is any issues with my content, just send me an email: feedback@techknowsurge.com
- Purchase a class on Udemy and leave me a review: https://www.udemy.com/user/techknowsurge/?srsltid=AfmBOoq3Ni_Pi-NjQL1vW2BSXXuwcu9XSc2OhrauDSLZjX7wD8amkb2d
- Subscribe to the TechKnowSurge newsletter: https://techknowsurge.com/newsletter-signup/
- Follow me on social media
- Facebook: https://www.facebook.com/TechKnowSurge
- Twitter: https://twitter.com/TechKnowSurge
- Instagram: https://www.instagram.com/techknowsurge
- LinkedIn: https://www.linkedin.com/company/techknowsurge
- Tell your others about TechKnowSurge
- Share content links to others
- Repost content on social media
- Tell classmates about what videos helped you