Coursera
Coursera Logo

CompTIA a+ Cyber 

  • Offered byCoursera

CompTIA a+ Cyber
 at 
Coursera 
Overview

Duration

31 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

CompTIA a+ Cyber
 at 
Coursera 
Highlights

  • Earn a certificate from CompTIA
  • Add to your LinkedIn profile
Details Icon

CompTIA a+ Cyber
 at 
Coursera 
Course details

What are the course deliverables?
  • What you'll learn
  • Understand and perform basic security tasks for Windows computers and home networks
  • Recognize the procedures and tools used in cybersecurity to protect enterprise networks
  • Describe the tools used for managing Linux computers and creating automation scripts
More about this course
  • Embark on an exciting journey into the world of cybersecurity with this comprehensive course. Designed for beginners, this cybersecurity course provides an introduction to cybersecurity, including basic knowledge and key skills needed to confidently start training for CompTIA Security+ certification.
  • In today's digital age, cybersecurity professionals are in high demand and are one of the highest-paying IT career paths. Job opportunities in this fast-growing sector seek applicants with technical skills, analytical thinking and creative problem-solving qualifications.
  • Through this course, you'll learn from cybersecurity experts and industry insiders about the day-to-day tasks and challenges you can expect in this role. You'll gain insights into how to protect a company's valuable information from theft and damage, ensuring that computers and networks store and process data according to the organization's rules.
  • Moreover, you'll acquire practical computer and network administration skills, preparing you to confidently begin a complete cybersecurity training program. This is your first step to becoming a key player in the cybersecurity field. By the end of this course you will be able to identify basic concepts of secure networking, understand common network operational procedures, and explain the basics of scripting.
Read more

CompTIA a+ Cyber
 at 
Coursera 
Curriculum

Module 1: Security Operations Fundamentals

Getting Started in Cybersecurity

Cybersecurity Skills and Working in Teams

Meet a Cybersecurity Team

Security Operations Center (SOC)

Interview: Seeing the Bigger Picture

Introduction to Cybersecurity Support Roles

What do Cybersecurity Professionals Do?

Exploring Cybersecurity Roles

Vulnerabilities, Threats, and Risk

Classifying Threats: Asking Who?

Classifying Threats: Asking Why?

Classifying Threats: Asking How?

Classifying Threats: Asking What?

Cybersecurity and Monitoring

Practice Quiz: Security Threats, Vulnerabilities, and Risks

Cybersecurity Support Roles Module Assessment

Introduction Discussion Forum

Module 2: Microsoft Windows Administration

Windows Desktop Interface

Administrator Tools in a Graphical User Interface

Administrator Tools in the Command-line Interface

Update & Security Settings in Administrator Tools

Monitoring CPU Performance

Monitoring Memory Performance

Monitoring Storage Performance

Monitoring Apps & Services

Microsoft Windows Administration Fundamentals

Managing Windows Computers Overview

User Account Settings

Security Best Practices

Windows Apps Overview

Monitoring System Performance

Unpacking Bits and Bytes

Installing and Updating Apps

Storage Introduction

Mass Storage and Interfaces

Organizing Mass Storage

The Windows Boot Process

Microsoft Windows Administration Module Assessment

Practice Lab Part A: Set Up a Windows Computer

Practice Lab Part B: Manage a Windows Computer

Practice Lab Part C: Secure a Windows Computer

Practice Lab: Manage Windows Apps

Practice Lab: Install and Configure Storage Devices

Module 3: Secure Network Client Fundamentals

IP Addressing

Firewall Basics

Social Engineering

Introduction to Network Protocols

What is a Network?

Network Models

The TCP/IP Model In Practice

What is a Network Link?

Internet Protocols and Addressing

Structure of an IP Address

Data Encapsulation and Ethernet Frames

Introduction to Configuring Network Clients

Network Device Connections

Configure IP Addresses in Windows

Testing IP Address Configuration

Managing a SOHO Network

Network Configuration Settings

Introduction to Secure Browsing

Secure Browsing

Secure Network Client Fundamentals Module Assessment

Practice Lab: Analyze Network Traffic

Practice Lab: Configure a Network Client

Practice Lab: Configure a SOHO Router

Practice Lab: Configure Browser Security

Module 4: Enterprise Campus Network Fundamentals

Switch Operations

Virtualization

What is an Enterprise/Campus Network?

Structured Cabling System Basics

What is a Switch?

How Does an Access Switch Forward Data?

Enterprise Access Points

Enterprise Routers

IPv6 Addressing

Defense in Depth Concepts

Cryptography Basics

Firewalls

Proxies

Intrusion Detection

Endpoint Security

What is a Data Center?

Data Center Features

High Availability and Redundancy

Containerization

Container Tools

Practice Quiz: Describe Enterprise Campus Networks

Practice Quiz: Describe the Role of Data Centers and Virtualization

Enterprise Campus Network Fundamentals Module Assessment

Practice Lab: Verify Network Firewall Configuration

Module 5: Enterprise Network Application Fundamentals

Symmetric Encryption

Asymmetric Encryption

The File Transfer Protocol (FTP)

Virtual Private Networks

The Internet of Things (IoT)

Authentication, Authorization, and Accounting

Identification and Authentication

Authentication Factors

Authorization

Cryptography in Practice

Digital Certificates

Accounting

Managing Network Traffic with Protocols

Web Application Protocols

File Sharing Protocols

Email Messaging Protocols

Unified Communications Protocols

Transport Layer Security Protocols

Introducing Applied Networking

Wide Area Networks

Virtual Private Network Protocols

Cloud Computing

Other Network Types Module Assessment

Practice Lab: Validate Network Accounts

Practice Lab: Evaluate Application Protocol Security

Practice Lab: Deploy an Azure Cloud VM

Discussing Unified Communications

Discussing Encryption

Module 6: Cybersecurity Controls

NMap Scan Basics

NMap Scan Results

Protocol Analyzing with Wireshark

Introduction to Network Operational Procedures

Asset Management

Security Tools

What are Footprinting and Fingerprinting?

Vulnerability Management

Backup Management

Introduction to Cybersecurity Resilience

Supporting High Availability

Fault Tolerance and Redundancy

Site Security

Disaster Recovery

Introduction to Cybersecurity Controls

Incident Response Planning

Dashboards and Incident Management

Intrusion Detection and Prevention Systems

Enhanced Detection

Log Collection

Security Orchestration, Automation and Response

Practice Quiz: Explain Cybersecurity Resilience

Cybersecurity Controls Module Assessment

Practice Lab: Identify Network Assets

Practice Lab: Remediate a Security Incident

Applications for Vulnerability Scanning

Discussing Physical Security

Module 7: Linux App Server Fundamentals

Bash Command Syntax

Introduction to Linux

What is Linux?

The Linux Command Syntax

Common Syntax Tricks

Text Editors

Privilege Escalation

Secure Shell (SSH)

Introduction to Managing Linux Servers

Linux Unified Filesystem

Working in the Home Directory

Searching in Linux

Linux File Management

Linux Users and Groups

Security in Linux File Permissions

Levels of Access in Linux

Basic Networking with Linux

Manage Server Connections with Linux

Introduction to Linux Applications

Package Management

Distro Families and Software Management

Process Management

Service Management

Log Files

What is LAMP?

Practice Quiz: Operating Linux Computers

Practice Quiz: Managing Linux Servers

Practice Quiz: Managing Linux Apps

Linux App Server Fundamentals Module Assessment

Practice Lab: Use a Linux Computer

Practice Lab Part A: Manage the Linux Filesystem

Practice Lab Part B: Manage Linux Network Settings

Practice Lab Part A: Configure Linux Apps

Practice Lab Part B: Use Linux Text Editors

Using SSH

Using Linux File Navigation

Module 8: Automation Scripting Fundamentals

The Development Environment

Unpacking Conditionals

Unpacking Loops

Introduction to Scripting

Understand Types of Code

The PowerShell Integrated Scripting Environment

Source Code Logic: Comments, Conditionals, and Branches

Source Code Logic: Loops

Source Code Logic: Functions and Operators

Containers in Scripts

Introduction to Script Development

Automation and Orchestration

Script Use Cases

Security in Scripting

Writing a Script

Practice Quiz: Scripting Fundamentals

Automation Scripting Fundamentals Module Assessment

Practice Lab: Develop a Bash Script

Module 9: Data Management Fundamentals

CompTIA a+ Cyber
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    CompTIA a+ Cyber
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...