Course Highlights
  • Online course
  • Eight weeks program
  • 15 to 20 hours of study per week
  • Professional guidance
  • MIT xPro course
  • Flexible payment options
  • Course certificate





Curriculum

3 Topics
An understanding of the repercussions of inadequate defensive security strategies.
How the NIST model applies to defensive strategy
A detailed overview of the layers of defense as well as an introduction to cryptography and how it relates to security services.

1 Topic
A high-level overview of cryptography concepts; including an introduction to hash functions; message authentication codes (MAC); symmetric key encryption; the relationship between public and shared key encryption; and more.

2 Topics
Examine SOC models and their purposes; functions; and services. Understand the differences between reactive and proactive threat detection and research a variety of SOC tools
Describe their functions; strengths/weaknesses; and administration.

2 Topics
Identify the key components and sequences of IR and describe the connections between IR and criminal digital forensics and disaster recovery.
Explore the real-life challenges organizations face with IR plans and teams to help you be better prepared for a potential IR position.

2 Topics
Understand the role and responsibilities of systems administrators
How they are able to protect against security issues and confirm that their protection measures are successful.

1 Topic
Dive deeper into the topic of secure network administration; from learning the fundamentals to exploring different types of network filtering.

3 Topics
Analyze fundamental cloud security concepts and principles
Explore the pros and cons of cloud-based services and other cloud service models.
An introduction to the components of the CSA Cloud Controls Matrix.

3 Topics
Consider the job responsibilities of an SOC analyst's role.
How VPNs connect the concepts of cryptography and network authentication services and explore security issues that can arise within an organization.
An opportunity to use soft and presentation skills through various learning activities during this final week.

  Write a Review

Certificate in Cybersecurity Defense

Go to Paid Course