Course Highlights
  • Recognize the importance of data security, maintaining data integrity, and confidentiality.
  • Demonstrate the installation of software updates and patches.
  • Identify preferred practices for authentication, encryption, and device security.
  • Discuss types of security threats, breaches, malware, social engineering, and other attack vectors.
Curriculum

5 Topics
Confidentiality Integrity and Availability Concerns
Importance of Security and Information Privacy
Security Threats and Ways of Breaches
Different Types of Security Threats
(Optional Activity) Cybersecurity Ops: Terminal

6 Topics
Password Management Techniques
Authentication Authorization and Accounting
Ways to Hardening Devices
Validation and Device usage
Encryption Concepts
Emails and Spam Management

5 Topics
Application Ecosystem Security
Public Browsing Risks
Browser Security Settings
Safe Browsing Techniques
Security Threats: Virtual Private Networks

  Write a Review

IBM: Beginners Guide to Cybersecurity

Go to Paid Course