Cybersecurity Essentials

Learn valuable security principles to improve your defense strategies and techniques, hereby boosting your job employability.

(Cybersec-ess) / ISBN : 978-1-64459-103-1
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
173 Reviews
Get A Free Trial

About This Course

This course, aligned with "Cybersecurity Essentials" ebook, offers a detailed yet approachable introduction to the cybersecurity field. By exploring core areas like infrastructure and network security, you'll gain the knowledge to protect devices, data, and systems from evolving cyber threats. In addition, the course uses real-world scenarios to solidify your understanding and prepares you for industry certifications.

Skills You’ll Get

  • Recognize and defend against common cyber threats.
  • Implement essential security practices.
  • Secure their devices and systems by configuring security settings.
  • Understand network protection methods like firewalls and access controls.
  • Develop critical thinking skills to identify vulnerabilities and implement appropriate security measures.

1

Introduction

  • Security Challenges
  • Who Should Read This Course
  • What Is Covered in This Course
2

Infrastructure Security in the Real World

  • Security Challenges
  • Summary
3

Understanding Access-Control and Monitoring Systems

  • A Quick Primer on Infrastructure Security
  • Access Control
  • Security Policies
  • Physical Security Controls
  • Access-Control Gates
  • Authentication Systems
  • Remote-Access Monitoring
  • Hands-On Exercises
4

Understanding Video Surveillance Systems

  • Video Surveillance Systems
  • Hands-On Exercises
5

Understanding Intrusion-Detection and Reporting Systems

  • Intrusion-Detection and Reporting Systems
  • Hands-On Exercises
6

Infrastructure Security: Review Questions and Hands-On Exercises

  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
7

Local Host Security in the Real World

  • Security Challenges
  • Summary
8

Securing Devices

  • The Three Layers of Security
  • Securing Host Devices
  • Hands-On Exercises
9

Protecting the Inner Perimeter

  • The Inner Perimeter
  • Hands-On Exercises
10

Protecting Remote Access

  • Protecting Local Computing Devices
  • Implementing Local Protection Tools
  • Using Local Intrusion-Detection Tools
  • Configuring Browser Security Options
  • Defending Against Malicious Software
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Applying Software Updates and Patches
  • Hands-On Exercises
11

Local Host Security: Review Questions and Hands-On Exercises

  • Summary Points
  • Security Challenge Scenarios
  • Review Questions
12

Local Network Security in the Real World

  • Security Challenges
  • Summary
13

Networking Basics

  • Understanding the Basics of Networking
  • The OSI Networking Model
  • Data Transmission Packets
  • OSI Layer Security
  • Network Topologies
  • Logical Topologies
  • Hands-On Exercises
14

Understanding Networking Protocols

  • The Basics of Networking Protocols
  • Network Control Strategies
  • Hands-On Exercises
15

Understanding Network Servers

  • The Basics of Network Servers
  • Hands-On Exercises
16

Understanding Network Connectivity Devices

  • Network Switches
  • Routers
  • Gateways
  • Network Bridges
  • Wireless Network Connectivity
  • Hands-On Exercises
17

Understanding Network Transmission Media Security

  • The Basics of Network Transmission MEDIA
  • Transmission Media Vulnerabilities
  • Hands-On Exercises
18

Local Network Security: Review Questions

  • Summary Points
  • Security Challenge Scenarios
19

Perimeter Security in the Real World

  • Security Challenges
  • Summary
20

Understanding the Environment

  • The Basics of Internet Security
  • Understanding the Environment
  • Hands-On Exercises
21

Hiding the Private Network

  • Understanding Private Networks
  • Hands-On Exercises
22

Protecting the Perimeter

  • Understanding the Perimeter
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • Demilitarized Zones (DMZs)
  • Honeypots
  • Extranets
  • Hands-On Exercises
23

Protecting Data Moving Through the Internet

  • Securing Data in Motion
  • Cryptography
  • Hands-On Exercises
24

Tools and Utilities

  • Using Basic Tools
  • Monitoring Tools and Software
  • Hands-On Exercises
25

Identifying and Defending Against Vulnerabilities

  • Zero Day Vulnerabilities
  • Software Exploits
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service (DoS) Attacks
  • Spam
  • Other Exploits
  • Hands-On Exercises
26

Perimeter Security: Review Questions and Hands-On Exercises

  • Summary Points
  • Security Scenario Review
  • Review Questions
A

Appendix A: NIST Preliminary Cybersecurity Framework

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

1

Protecting the Inner Perimeter

  • Converting a FAT32 Partition to NTFS Using Disk Management
  • Converting a FAT32 Partition to NTFS Using PowerShell
  • Converting a FAT32 Partition to FAT Using Disk Management
  • Establishing a VPN Connection
  • Configuring Inbound Rules for Firewall
  • Establishing Lockout Policies
  • Configuring Auditing in Windows
  • Using BitLocker Data Encryption Tools
  • Configuring Firewall Settings
  • Encrypting and Decrypting a File Using AES Crypt
  • Creating Folder Permissions
  • Using Microsoft File Encryption Tools
  • Configuring Application Control Policy
  • Establishing User and Group Account
  • Enabling Event Logging
  • Knowing Filesystem in Linux
  • Configuring Share Permissions
  • Adding a Printer
  • Observing the Impact of Moving an Encrypted File
2

Protecting Remote Access

  • Setting Password Policies
  • Capturing the Network Traffic Using Wireshark
  • Creating a TCP Outbound Rule
  • Creating an ICMP Outbound Rule
3

Networking Basics

  • Configuring File and Share Permissions
4

Understanding Networking Protocols

  • Assigning File or Folder Permissions
  • Using the PING Command
  • Configuring Advanced Permissions
  • Using the nbtstat and tracert Utilities
  • Using the arp and netstat Utilities
  • Modifying the Command Prompt Window
  • Knowing MAC, IPv4, and IPv6 addresses
  • Adding a Loopback Adapter and Class A/B/C IPv4 Addresses
5

Understanding Network Servers

  • Monitoring the Denial of Service (DoS) Attack
  • Viewing the Application, Security, and System Logs
  • Scanning Vulnerabilities Using Microsoft Baseline Security Analyzer
  • Adding Users or Groups in a Linux Distribution
6

Understanding the Environment

  • Examining Browsing History Options
  • Configuring Pop-up Blocker Settings
  • Accessing the Security Settings in Internet Explorer
  • Adding a Site to a Security Zone
7

Hiding the Private Network

  • Creating a Virtual Switch
  • Checking Hyper-V Compatibility
  • Enabling Hyper-V in Windows
  • Pinning Hyper-V Manager to the Taskbar
  • Installing a Linux Distribution in Hyper-V
8

Protecting Data Moving Through the Internet

  • Using MD5 Hash Algorithms
9

Tools and Utilities

  • Using the nslookup and tracert Utilities
  • Capturing Packet Using Wireshark
  • Scanning Network Using Nmap
  • Using the ipconfig and ping Commands
10

Identifying and Defending Against Vulnerabilities

  • Creating a New Software Restriction Policy

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

The course completion time will depend on your learning pace, but most students finish it within 6 months or more.

You’ll gain a foundational understanding of cybersecurity essentials skills for all, learn to secure devices and networks, prepare for entry-level certifications, and develop critical thinking skills for navigating cyber threats.

You'll have access to various support options throughout the course, such as 24/7 support team, downloadables, hands-on cyber security labs, gamified testpreps, video tutorials, and more.

Take the Cybersecurity Essential Training to Gain Job-Relevant Skills

Apply your knowledge through hands-on labs to secure devices, networks, and data from evolving cyberattacks.  

$ 433.42

Buy Now

Related Courses

All Course
scroll to top