Cybersecurity and Networking Fundamentals
Cybersecurity
| Beginner
- 13 videos | 42m 5s
- Includes Assessment
- Earns a Badge
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine security and describe why security is essential wherever data existsProvide an overview of the confidentiality, integrity, and availability (cia) triadRecognize essential security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasuresDescribe the fundamentals of aaa services including identification, authentication, authorization, auditing, and accountabilityList common countermeasure techniques and strategiesList factors to consider when evaluating risk
-
Describe how risks can be mitigated, accepted, transferred, and rejectedDifferentiate between security and usabilityProvide an overview of information flow and how it relates to cybersecurityRecognize the importance of information flow models and how they can help prevent unauthorized information flow in any directionDifferentiate between common networking components such as servers, clients, ports, and protocolsRecognize techniques used to gather valuable information about a system
IN THIS COURSE
-
2m 33s
-
32s
-
1m 29s
-
2m 5s
-
1m 18s
-
2m 45s
-
5m 27s
-
3m 51s
-
2m 25s
-
34s
-
7m 34s
-
9m 26s
-
2m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.