Foundations of Cybersecurity
- Offered byCoursera
Foundations of Cybersecurity at Coursera Overview
Duration | 13 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Foundations of Cybersecurity at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Beginner Level
- Approx. 13 hours to complete
- English Subtitles: English
Foundations of Cybersecurity at Coursera Course details
- This is the first course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to prepare for an entry-level cybersecurity job.
- In this course, you will be introduced to the world of cybersecurity through an interactive curriculum developed by Google. You will identify significant events that led to the development of the cybersecurity field, explain the importance of cybersecurity in today's business operations, and explore the job responsibilities and skills of an entry-level cybersecurity analyst.
- Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
- Learners who complete the eight courses in the Google Cybersecurity Certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
- By the end of this course, you will:
- - Identify how security attacks impact business operations.
- - Explore the job responsibilities and core skills of an entry-level cybersecurity analyst.
- - Recognize how past and present attacks on organizations led to the development of the cybersecurity field.
- - Learn the CISSP eight security domains.
- - Identify security domains, frameworks, and controls.
- - Explain security ethics.
- - Recognize common tools used by cybersecurity analysts.
Foundations of Cybersecurity at Coursera Curriculum
Welcome to the exciting world of cybersecurity
Welcome to the Google Cybersecurity Certificate
Welcome to week 1
Introduction to cybersecurity
Toni: My path to cybersecurity
Responsibilities of an entry-level cybersecurity analyst
Nikki: A day in the life of a security engineer
Core skills for cybersecurity professionals
Veronica: My path to working in cybersecurity
The importance of cybersecurity
Wrap-up
Google Cybersecurity Certificate overview
Course 1 overview
Helpful resources and tips
Participate in program surveys
Common cybersecurity terminology
Transferable and technical cybersecurity skills
Glossary terms from week 1
Test your knowledge: Introduction to cybersecurity
Test your knowledge: Core skills for cybersecurity professionals
Weekly challenge 1
The evolution of cybersecurity
Welcome to week 2
Past cybersecurity attacks
Attacks in the digital age
Sean: Keep your cool during a data breach
Introduction to the eight CISSP security domains, Part 1
Introduction to the eight CISSP security domains, Part 2
Wrap-up
Common attacks and their effectiveness
Determine the type of attack
Understand attackers
Glossary terms from week 2
Test your knowledge: The history of cybersecurity
Test your knowledge: The eight CISSP security domains
Weekly challenge 2
Protect against threats, risks, and vulnerabilities
Welcome to week 3
Introduction to security frameworks and controls
Secure design
Heather: Protect sensitive data and information
Ethics in cybersecurity
Holly: The importance of ethics as a cybersecurity professional
Wrap-up
Controls, frameworks, and compliance
Ethical concepts that guide cybersecurity decisions
Glossary terms from week 3
Test your knowledge: Frameworks and controls
Test your knowledge: Ethics in cybersecurity
Weekly challenge 3
Cybersecurity tools and programming languages
Welcome to week 4
Common cybersecurity tools
Introduction to Linux, SQL, and Python
Wrap-up
Course wrap-up
Tools for protecting business operations
Use tools to protect business operations
Create a cybersecurity portfolio
Portfolio Activity Exemplar: Draft a professional statement
Glossary terms from week 4
Course 1 glossary
Get started on the next course
Test your knowledge: Important cybersecurity tools
Test your knowledge: Core cybersecurity knowledge and skills
Portfolio Activity: Draft a professional statement
Weekly challenge 4