Linkedin Learning
Linkedin Learning Logo

Cybersecurity Foundations 

  • Offered byLinkedin Learning

Cybersecurity Foundations
 at 
Linkedin Learning 
Overview

Set a rock-solid foundation for your network, users, and data by learning about the basics of cybersecurity

Duration

3 hours

Total fee

1,150

Mode of learning

Online

Difficulty level

Beginner

Credential

Certificate

Cybersecurity Foundations
 at 
Linkedin Learning 
Highlights

  • Earn a certificate of completion from LinkedIn Learning
Details Icon

Cybersecurity Foundations
 at 
Linkedin Learning 
Course details

More about this course
  • Join security expert Malcolm Shore as he describes how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST and COBIT
  • Malcolm details pertinent cyber threats and how they operate, including how cyber criminals hide their attacks, how advanced persistent threats work, and even how to determine what's real and what's merely cyber fear, uncertainty, and doubt (FUD)
  • He also covers the way in which cyber risk is managed and the lifecycle of cybersecurity—from managing defense through to preparing for and responding to an incident

Cybersecurity Foundations
 at 
Linkedin Learning 
Curriculum

Introduction

Understanding the cybersecurity frameworks and standards

What you should know

Cyber Threats

Understanding the Cyber Kill Chain

Pre-cyber threats

The emergence of the cyber threats

Botnets and the cybercrime industry

Cloaking and alternate data streams

Hiding using processes

Controlling the target through a rootkit

Phishing and watering holes

Understanding advanced persistent threats

Ransomware: A modern form of extortion

Hardware implants and other cyber FUD

Frameworks for Protection against Cyber Threats

The Orange Book: Early concepts in computer security

Understanding the NIST Cybersecurity Framework

Adopting the NIST Cybersecurity Framework

Understanding the basics of cyber risk

Analyzing cyber threats and controls

Recording, reporting, and the risk context

An advanced risk framework

Managing security with COBIT

COBIT for operational security

Introduction to cybersecurity controls

Cybersecurity control framework

Cybersecurity standards of good practice

Making Cybersecurity Effective

Architecting for security

Protecting payment card data

Clouding the issues

Securing things on the internet

Making sure security is effective

Detecting and Managing Cyber Incidents

Incident management basics

Measuring incident management maturity

Detecting an attack

Hunting for threats

Responding to an incident

Cyber Diplomacy

Cybersecurity goes global

Understanding cyber norms

Cybil and the Global Forum on Cyber Expertise

The Traffic Light Protocol

Conclusion

What's next

Faculty Icon

Cybersecurity Foundations
 at 
Linkedin Learning 
Faculty details

Malcolm Shore
Teaching post graduate security (forensics, information warfare, security management, applied cryptography)

Other courses offered by Linkedin Learning

– / –
1 hours
Intermediate
25 K
1 month
– / –
899
1 hours
Intermediate
– / –
1 hours
Advanced
View Other 504 CoursesRight Arrow Icon
qna

Cybersecurity Foundations
 at 
Linkedin Learning 

Student Forum

chatAnything you would want to ask experts?
Write here...