CompTIA a+ Cyber
- Offered byCoursera
CompTIA a+ Cyber at Coursera Overview
Duration | 31 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
CompTIA a+ Cyber at Coursera Highlights
- Earn a certificate from CompTIA
- Add to your LinkedIn profile
CompTIA a+ Cyber at Coursera Course details
- What you'll learn
- Understand and perform basic security tasks for Windows computers and home networks
- Recognize the procedures and tools used in cybersecurity to protect enterprise networks
- Describe the tools used for managing Linux computers and creating automation scripts
- Embark on an exciting journey into the world of cybersecurity with this comprehensive course. Designed for beginners, this cybersecurity course provides an introduction to cybersecurity, including basic knowledge and key skills needed to confidently start training for CompTIA Security+ certification.
- In today's digital age, cybersecurity professionals are in high demand and are one of the highest-paying IT career paths. Job opportunities in this fast-growing sector seek applicants with technical skills, analytical thinking and creative problem-solving qualifications.
- Through this course, you'll learn from cybersecurity experts and industry insiders about the day-to-day tasks and challenges you can expect in this role. You'll gain insights into how to protect a company's valuable information from theft and damage, ensuring that computers and networks store and process data according to the organization's rules.
- Moreover, you'll acquire practical computer and network administration skills, preparing you to confidently begin a complete cybersecurity training program. This is your first step to becoming a key player in the cybersecurity field. By the end of this course you will be able to identify basic concepts of secure networking, understand common network operational procedures, and explain the basics of scripting.
CompTIA a+ Cyber at Coursera Curriculum
Module 1: Security Operations Fundamentals
Getting Started in Cybersecurity
Cybersecurity Skills and Working in Teams
Meet a Cybersecurity Team
Security Operations Center (SOC)
Interview: Seeing the Bigger Picture
Introduction to Cybersecurity Support Roles
What do Cybersecurity Professionals Do?
Exploring Cybersecurity Roles
Vulnerabilities, Threats, and Risk
Classifying Threats: Asking Who?
Classifying Threats: Asking Why?
Classifying Threats: Asking How?
Classifying Threats: Asking What?
Cybersecurity and Monitoring
Practice Quiz: Security Threats, Vulnerabilities, and Risks
Cybersecurity Support Roles Module Assessment
Introduction Discussion Forum
Module 2: Microsoft Windows Administration
Windows Desktop Interface
Administrator Tools in a Graphical User Interface
Administrator Tools in the Command-line Interface
Update & Security Settings in Administrator Tools
Monitoring CPU Performance
Monitoring Memory Performance
Monitoring Storage Performance
Monitoring Apps & Services
Microsoft Windows Administration Fundamentals
Managing Windows Computers Overview
User Account Settings
Security Best Practices
Windows Apps Overview
Monitoring System Performance
Unpacking Bits and Bytes
Installing and Updating Apps
Storage Introduction
Mass Storage and Interfaces
Organizing Mass Storage
The Windows Boot Process
Microsoft Windows Administration Module Assessment
Practice Lab Part A: Set Up a Windows Computer
Practice Lab Part B: Manage a Windows Computer
Practice Lab Part C: Secure a Windows Computer
Practice Lab: Manage Windows Apps
Practice Lab: Install and Configure Storage Devices
Module 3: Secure Network Client Fundamentals
IP Addressing
Firewall Basics
Social Engineering
Introduction to Network Protocols
What is a Network?
Network Models
The TCP/IP Model In Practice
What is a Network Link?
Internet Protocols and Addressing
Structure of an IP Address
Data Encapsulation and Ethernet Frames
Introduction to Configuring Network Clients
Network Device Connections
Configure IP Addresses in Windows
Testing IP Address Configuration
Managing a SOHO Network
Network Configuration Settings
Introduction to Secure Browsing
Secure Browsing
Secure Network Client Fundamentals Module Assessment
Practice Lab: Analyze Network Traffic
Practice Lab: Configure a Network Client
Practice Lab: Configure a SOHO Router
Practice Lab: Configure Browser Security
Module 4: Enterprise Campus Network Fundamentals
Switch Operations
Virtualization
What is an Enterprise/Campus Network?
Structured Cabling System Basics
What is a Switch?
How Does an Access Switch Forward Data?
Enterprise Access Points
Enterprise Routers
IPv6 Addressing
Defense in Depth Concepts
Cryptography Basics
Firewalls
Proxies
Intrusion Detection
Endpoint Security
What is a Data Center?
Data Center Features
High Availability and Redundancy
Containerization
Container Tools
Practice Quiz: Describe Enterprise Campus Networks
Practice Quiz: Describe the Role of Data Centers and Virtualization
Enterprise Campus Network Fundamentals Module Assessment
Practice Lab: Verify Network Firewall Configuration
Module 5: Enterprise Network Application Fundamentals
Symmetric Encryption
Asymmetric Encryption
The File Transfer Protocol (FTP)
Virtual Private Networks
The Internet of Things (IoT)
Authentication, Authorization, and Accounting
Identification and Authentication
Authentication Factors
Authorization
Cryptography in Practice
Digital Certificates
Accounting
Managing Network Traffic with Protocols
Web Application Protocols
File Sharing Protocols
Email Messaging Protocols
Unified Communications Protocols
Transport Layer Security Protocols
Introducing Applied Networking
Wide Area Networks
Virtual Private Network Protocols
Cloud Computing
Other Network Types Module Assessment
Practice Lab: Validate Network Accounts
Practice Lab: Evaluate Application Protocol Security
Practice Lab: Deploy an Azure Cloud VM
Discussing Unified Communications
Discussing Encryption
Module 6: Cybersecurity Controls
NMap Scan Basics
NMap Scan Results
Protocol Analyzing with Wireshark
Introduction to Network Operational Procedures
Asset Management
Security Tools
What are Footprinting and Fingerprinting?
Vulnerability Management
Backup Management
Introduction to Cybersecurity Resilience
Supporting High Availability
Fault Tolerance and Redundancy
Site Security
Disaster Recovery
Introduction to Cybersecurity Controls
Incident Response Planning
Dashboards and Incident Management
Intrusion Detection and Prevention Systems
Enhanced Detection
Log Collection
Security Orchestration, Automation and Response
Practice Quiz: Explain Cybersecurity Resilience
Cybersecurity Controls Module Assessment
Practice Lab: Identify Network Assets
Practice Lab: Remediate a Security Incident
Applications for Vulnerability Scanning
Discussing Physical Security
Module 7: Linux App Server Fundamentals
Bash Command Syntax
Introduction to Linux
What is Linux?
The Linux Command Syntax
Common Syntax Tricks
Text Editors
Privilege Escalation
Secure Shell (SSH)
Introduction to Managing Linux Servers
Linux Unified Filesystem
Working in the Home Directory
Searching in Linux
Linux File Management
Linux Users and Groups
Security in Linux File Permissions
Levels of Access in Linux
Basic Networking with Linux
Manage Server Connections with Linux
Introduction to Linux Applications
Package Management
Distro Families and Software Management
Process Management
Service Management
Log Files
What is LAMP?
Practice Quiz: Operating Linux Computers
Practice Quiz: Managing Linux Servers
Practice Quiz: Managing Linux Apps
Linux App Server Fundamentals Module Assessment
Practice Lab: Use a Linux Computer
Practice Lab Part A: Manage the Linux Filesystem
Practice Lab Part B: Manage Linux Network Settings
Practice Lab Part A: Configure Linux Apps
Practice Lab Part B: Use Linux Text Editors
Using SSH
Using Linux File Navigation
Module 8: Automation Scripting Fundamentals
The Development Environment
Unpacking Conditionals
Unpacking Loops
Introduction to Scripting
Understand Types of Code
The PowerShell Integrated Scripting Environment
Source Code Logic: Comments, Conditionals, and Branches
Source Code Logic: Loops
Source Code Logic: Functions and Operators
Containers in Scripts
Introduction to Script Development
Automation and Orchestration
Script Use Cases
Security in Scripting
Writing a Script
Practice Quiz: Scripting Fundamentals
Automation Scripting Fundamentals Module Assessment
Practice Lab: Develop a Bash Script
Module 9: Data Management Fundamentals