Cybersecurity Foundations
- Offered byLinkedin Learning
Cybersecurity Foundations at Linkedin Learning Overview
Duration | 3 hours |
Total fee | ₹1,150 |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
Cybersecurity Foundations at Linkedin Learning Highlights
- Earn a certificate of completion from LinkedIn Learning
Cybersecurity Foundations at Linkedin Learning Course details
- Join security expert Malcolm Shore as he describes how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST and COBIT
- Malcolm details pertinent cyber threats and how they operate, including how cyber criminals hide their attacks, how advanced persistent threats work, and even how to determine what's real and what's merely cyber fear, uncertainty, and doubt (FUD)
- He also covers the way in which cyber risk is managed and the lifecycle of cybersecurity—from managing defense through to preparing for and responding to an incident
Cybersecurity Foundations at Linkedin Learning Curriculum
Introduction
Understanding the cybersecurity frameworks and standards
What you should know
Cyber Threats
Understanding the Cyber Kill Chain
Pre-cyber threats
The emergence of the cyber threats
Botnets and the cybercrime industry
Cloaking and alternate data streams
Hiding using processes
Controlling the target through a rootkit
Phishing and watering holes
Understanding advanced persistent threats
Ransomware: A modern form of extortion
Hardware implants and other cyber FUD
Frameworks for Protection against Cyber Threats
The Orange Book: Early concepts in computer security
Understanding the NIST Cybersecurity Framework
Adopting the NIST Cybersecurity Framework
Understanding the basics of cyber risk
Analyzing cyber threats and controls
Recording, reporting, and the risk context
An advanced risk framework
Managing security with COBIT
COBIT for operational security
Introduction to cybersecurity controls
Cybersecurity control framework
Cybersecurity standards of good practice
Making Cybersecurity Effective
Architecting for security
Protecting payment card data
Clouding the issues
Securing things on the internet
Making sure security is effective
Detecting and Managing Cyber Incidents
Incident management basics
Measuring incident management maturity
Detecting an attack
Hunting for threats
Responding to an incident
Cyber Diplomacy
Cybersecurity goes global
Understanding cyber norms
Cybil and the Global Forum on Cyber Expertise
The Traffic Light Protocol
Conclusion
What's next