Foundations of Cybersecurity

In this comprehensive course, participants will delve into the fundamental principles and practices of cybersecurity, equipping themselves with the knowledge and skills needed to defend digital systems and data against cyber threats. Through a structured curriculum, participants will explore the core concepts of cybersecurity, including threat identification, vulnerability assessment, and attack mitigation strategies. The course will cover essential topics such as risk management, access control mechanisms, encryption techniques, and identity and access management (IAM).

Throughout the program, participants will gain a deep understanding of the cybersecurity landscape, learning to recognize and address potential risks that could compromise the confidentiality, integrity, and availability of information. They will explore real-world case studies and scenarios to apply theoretical knowledge to practical situations, developing critical thinking and problem-solving skills essential for effective cybersecurity practices.

About This Course

Key components of the course include:

  • Understanding the nature of cyber threats, vulnerabilities, and attacks.
  • Implementing risk management strategies to prioritize and mitigate potential risks.
  • Utilizing access control mechanisms to control and monitor access to digital resources.
  • Employing encryption techniques to protect sensitive data from unauthorized access or tampering.
  • Managing digital identities and access privileges through identity and access management (IAM) solutions.
  • By the end of this course, participants will emerge with a solid foundation in cybersecurity principles and best practices, prepared to contribute to the security posture of their organizations and navigate the evolving cybersecurity landscape with confidence.

Explore the Mysteries of Cybersecurity

  • Master Needed Cybersecurity Knowledge and Skills for IT Certification Tests
  • Learn Foundational Knowledge to Accelerate Network and IT Training
  • Accelerate Your IT Career

Learn it Right, Learn it Well, and Reap the Rewards

Spending the time now to fully understand the core information of cybersecurity principles will help create a strong foundation to build off of.

Module Descriptions

Welcome and Getting Started: Prepare yourself for efficiently and successfully completing the course. You’ll get an overview of what the course is all about and what you should expect out of it.

Defining Cybersecurity: This module introduces the fundamental concepts of cybersecurity, exploring its definition, scope, and importance in protecting digital assets from unauthorized access, breaches, and disruptions.

Threats to Security: Participants will examine various types of cyber threats, including malware, phishing attacks, and denial-of-service (DoS) attacks, gaining insights into how these threats can compromise the security of systems and data.

Protecting Against Threats: This module focuses on strategies and measures to mitigate cyber threats.

Identity and Access Management: Participants will learn about the principles and practices of identity and access management (IAM), including authentication, authorization, and access control mechanisms, to manage digital identities and control access to resources effectively.

Confidentiality: Exploring the concept of confidentiality, this module covers encryption techniques, data classification, and access controls to ensure that sensitive information remains protected from unauthorized disclosure.

Integrity: This module focuses on maintaining data integrity, covering methods such as digital signatures and database integrity mechanisms.

Availability: Exploring the importance of availability in cybersecurity, this module covers strategies such as redundancy, fault tolerance, and disaster recovery to ensure that systems and data remain accessible and operational even in the face of disruptions or failures.

Securing Your Network: Participants will learn about network security principles and best practices, including implementing secure configurations, segmenting networks, and monitoring network traffic to protect against unauthorized access and cyber threats.

Wrap Up: Time to wrap up the course and provide any final thoughts.

How to Take This Course!

Option #1 – Watch this course on YouTube. For convenience, I’ve included links to the videos down below

Option #2 – Take this course on Udemy. This is not a free option, but has the advantage of a full learning management system, no commercials, and completion certificates.

Here’s the link to the Udemy Course:

https://www.udemy.com/course/foundations-of-cybersecurity/?referralCode=479D43C9779EAFBAA8E4

 

Course Content

Module 0 – Welcome and Getting Started

Welcomehttps://youtu.be/GvIDcpDdVHk0:01:33
Course Overviewhttps://youtu.be/vw8_8a9O99w0:07:39
SyllabusN/A
Meet Your InstructorN/A

 

Module 1 – Defining Cybersecurity

Module Introhttps://youtu.be/eLC55LrbJbE0:01:25
What is Cybersecurityhttps://youtu.be/SAGAoURA41Q0:07:13
The CIA Triadhttps://youtu.be/g_7ts5R8rSk0:06:36
Cyber Incident Impacthttps://youtu.be/XrHbJv40lA80:05:39
Key Cybersecurity Conceptshttps://youtu.be/A2eCQeY9_zY0:07:41
Cybersecurity Cubehttps://youtu.be/LahbvX039zc0:07:50

 

Module 2 – Threats to Security

Module Introhttps://youtu.be/OPeY4hMYPlI0:01:28
Threat Agentshttps://youtu.be/r5dlRIiQ1Zc0:14:20
Common Attack Vectorshttps://youtu.be/OxAOylCCiP40:10:29
Common Vulnerabilitieshttps://youtu.be/d_t2QRzZbIA0:06:41
Common Equipment Vulnerabilitieshttps://youtu.be/knm2Lh3L7PE0:09:06
Common Software Vulnerabilitieshttps://youtu.be/H9klVYt7sXE0:10:31
Race Conditionshttps://youtu.be/mq59FxItJ2w0:09:09
Social Engineering Techniqueshttps://youtu.be/VlEOJcc_Wcc0:10:48
How Passwords are Hackedhttps://youtu.be/3MVmZLOhky80:11:15
Malwarehttps://youtu.be/w24NK4BWTW40:13:37
Common Network Attackshttps://youtu.be/KjnaE0AnQ5Q0:14:10

 

Module 3 – Protecting Against Threats

Module Introhttps://youtu.be/BDTGOpdajyU0:02:07
Protecting a Cybersecurity Domainhttps://youtu.be/bA9teHvqufI0:06:48
What is a Cybersecurity Programhttps://youtu.be/gDwPN559ZCU0:08:03
Policies, Standards, Procedures, Guidelines, and Controlshttps://youtu.be/gazZ3lyQsRo0:12:35
Types of Controlshttps://youtu.be/6__cew2fQHQ0:05:10
What is a Security Frameworkshttps://youtu.be/AedAu3LC4e40:07:29
Risk Managementhttps://youtu.be/dSimIA1kVKA0:06:21
Cybersecurity Lifecycleshttps://youtu.be/7pcH25rpHnI0:02:57
Basic Security Principleshttps://youtu.be/y8XR9JcGIMM0:06:06

 

Module 4 – Identity and Access Management (IAM)

Module Introhttps://youtu.be/81c72t36EEo0:01:26
Identity and Access Managementhttps://youtu.be/3SvGygX4zEw0:04:52
Authentication, Authorization, Accounting (AAA)https://youtu.be/zuVCyNRC4ag0:03:30
Password Habitshttps://youtu.be/89VBdWbcWqc0:23:57
Multi-Factor Authenticationhttps://youtu.be/rtPF6EsLslU0:04:07
Password Enforcementhttps://youtu.be/I2rlJIPd31U0:06:18
Federationhttps://youtu.be/0hR3ZlIBc8M0:05:36
Access Controlhttps://youtu.be/y8ZSXa8nl2Q0:13:18
Access Control Modelshttps://youtu.be/Z0bUndO65Jo0:09:32
Physical Access Controlhttps://youtu.be/82tRGGy8zI00:06:29

 

Module 5 – Confidentiality

Module Introhttps://youtu.be/HmonDZjRByo0:03:03
Confidentialityhttps://youtu.be/Jtg7LI91bpg0:10:06
Data Lifecyclehttps://youtu.be/y1W_9qXqoCY0:09:22
Encrypting Datahttps://youtu.be/iv4aDRfEGk80:03:30
Data Managementhttps://youtu.be/W7Vz9B1NWtQ0:07:46
Steganographyhttps://youtu.be/RG3sUj1hnwE0:05:00
Data Obfuscationhttps://youtu.be/egABOKi0ncw0:07:54

 

Module 6 – Integrity

Module Introhttps://youtu.be/lfu8IjJtW440:01:13
Integrityhttps://youtu.be/k169OWDoRco0:05:31
PKI and Digital Certificateshttps://youtu.be/BVs0Ccc_Tpw0:09:27
Digital Signatureshttps://youtu.be/49EzgMDmjQM0:04:36
Database Integrityhttps://youtu.be/uqXp34glmhU0:13:06

 

Module 7 – Availability

Module Introhttps://youtu.be/zTIRSg3Zb7M0:02:09
High Availability (HA)https://youtu.be/gbBD0xFgTG00:10:35
Measuring Availability, Five 9’s, and SLAshttps://youtu.be/n7Pc9DRC2Dc0:06:52
Redundancyhttps://youtu.be/5MzcR0R2DGc0:15:47
Replicationhttps://youtu.be/PodFOD2z9U00:06:31
Incident Responsehttps://youtu.be/0sTyAvSCN5Y0:06:29
Disaster Recoveryhttps://youtu.be/C0bsmlvgaSU0:10:56
RPO and RTOhttps://youtu.be/lQGEQ2fFoqw0:05:30
Backupshttps://youtu.be/U-AJ8o-OBm40:16:35
Backup Typeshttps://youtu.be/rWCVEcHmweQ0:10:04
Database Backupshttps://youtu.be/YJGnMIFjdOc0:04:03

 

Module 8 – Securing Your Network

Module Introhttps://youtu.be/bz5O_1JIVn40:02:22
Physical Securityhttps://youtu.be/vcEYI6QaIYo0:10:17
Network Securityhttps://youtu.be/lFih7D6s8cQ0:14:39
Firewallshttps://youtu.be/tmUIEQmRXvQ0:06:44
Remote accesshttps://youtu.be/gHu9ner7kkE0:12:24
Equipment Hardeninghttps://youtu.be/Ubmi8MRDv000:05:01
Host-Based Securityhttps://youtu.be/Lfy6EvrP3Y80:11:32

 

Module X – Wrap Up

Reviewhttps://youtu.be/U_l6CXddSKw0:03:27
Course Wrap Uphttps://youtu.be/ze1VSTWAH5o0:02:24

 

Help the Effort

Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and received very little in return. Please consider helping keep the effort going by one of the following: