What you'll learn
- Understand how information is sent in a wide area network
- Understand how malware affects your devices and how to identify threats in a network
- How to monitor and mitigate risk
- How to use analytics to build user-centric behavioural patterns
- History of the NIST Framework
Diploma in Cybersecurity
Exploring the Fundamentals of Networking
In this lesson, you will explore the fundamentals of networking. You will look at network topology, how data is created, the OSI -TCP/IP stack, identifying different devices in a network, and understanding how different networks create the internet.
Setting Up a Small Network
Identify hardware required for creating a network before diving into a practical demonstration on creation of traffic (data) on devices and transferring it to the ISP (internet service provider).
Concept of a Wi-Fi or Wireless Network
Explore wireless routers and access points, and how they operate. Manage an on-premise access points and understand cloud-managed access points, and the benefits of using them. This lesson takes an in-depth look at how devices are connected wirelessly, the capabilities of networking, and how a wireless network adaptor works.
Types of Wireless Access Points
This lesson will provide you with a solid understanding of the different types of wireless networks, which are WAN (Wide Area Networks), LAN (Local Area Networks), and PAN ( Personal Area Network).
This lesson delves into the concept of logical addressing, how CPU generates the logical address, and how to map the logcal address with the memory-management unit to its corresponding physical address.
Benefits of a Wi-Fi Wireless Network
Understand the benefits, convenience and differences of the internet, intranet, and extranet. This lesson also looks at how these can increase productivity in an enterpise network. Explore Network File Sharing over a wireless network, and lastly, see how encrypted information (traffic) is sent over the extranet network.
Design and Deployment of Enterprise Wireless
This lesson explores the architecture of centralised deployment, converged deployment and cloud-based deployment. Learn how to set these up and understand the differences when applied in an enterprise network.
Implementing Security on a Wireless and Wired Network
The final lesson in module one looks at attacks on WLANs, and how to use wireless protocol analysers for emerging security solutions.
Intermediate in Cybersecurity
Identifying the Need for Security
What are network security threats, and what is the discrepancy between active and passive attacks? Today's lesson is about identifying the need for security. We will look at network vulnerabilities, the difference between threats, malware, vulnerability and risks, and discover ways to identify network security threats.
We've all heard that passwords like "123456" or "P@ssword" are the worst things to choose when protecting ourselves online. What exactly are the advantages of passwords and biometric security? Why do we use antivirus software? This lesson answers those questions plus explores blocking ads and enhancing software features with the lates security patches.
Risk of Network Attacks
Do you know the risks of network attacks? After this lesson, you understand common network security risks, the scale and impact of industrial espionage, and network disruption and resilience.
Identify and Mitigate Network Attacks
Understand the theory behind "network cloaking" and how it can mitigate risk, the Intrusion Prevention System (IPS) and how it works, and protecting a network with security "onion" and "artichoke" approaches.
Securing Managing Wireless Devices
Learn how to implement security on a wireless network, use cloud-based tools to manage a network, and minimise the risks to your wireless network.
Securing Web, Email and Social Networking
In this lesson, you will know how creating security awareness for employees helps reduce risk in the workplace. You'll understand why businesses need security awareness training, and the importance of encrypting sensitive data.
Applying Physical Security on Devices
Apply password-protect and understand the benefits of its use on your device, backup data using cloud services, and the different tracking software processes on mac/Linux/windows.
Protecting Your Data
There are countless videos and documentaries online about the impact of social media on personal information and behaviours, yet there are still hundreds of millions of people logging in and checking their phones multiple times a day without protecting themselves. From a security perspective, we all need to learn the dangers that lurk on social media. Understand how social media could be used to gather intelligence on you by hackers, explore phishing emails and learn how to identify an authentic WiFi network.
Advanced in Cybersecurity
Introduction to Network Security
Learn the different types of network attacks and prevention techniques, analyse data (traffic) on a network using Wireshark and network miner, and restrict and monitor access to your network and data.
Firewalls and VPN
Carrying over from our previous lesson, we will explore data using Wireshark in more detail, verify encryption of VPNs on the network, and how to set up a defence mechanism.
Anti-virus and Anti-malware Software
Learn how to identify a threat in a system using anti-malware, use Artificial Intelligence and Machine Learning in real-time protection and on-demand scanning, and apply malware protection and best practices.
Network Segmentation/Intrusion Prevention Systems
This lesson will explore network segmentation, security considerations when implementing segmentation, and ways to improve the performance of a network.
By the end of this lesson, you will understand access control and its common types - Role-based Access Control (RBAC), Discretionary Access Control (DAC) and Mandatory Access Control (MAC).
This lesson serves as an introduction to Authentication, Authorization, and Accounting (AAA). We'll explore its benefits in application security, how it is applied, and the role of encryption within it.
This lesson gives you an introduction to data analytics, including how to use analytics to build user-centric behavioral patterns. We'll explore the benefits of behavioural analytics, particularly with Artificial Intelligence and Machine Learning.
Data Loss Prevention/Event Management
After this lesson you'll know what data loss prevention (DLP) is and its main objectives, followed by best practices.
Proficient in Cybersecurity
History of the NIST Framework
Kick off our final module with identifying the incentive that led to the invention of the NIST Framework, which involved a public-private collaboration. As it is important to stay up to date, we will go through the continuous development projects in the Framework.
Understanding the Structure of the Framework Component
Understand the information cybersecurity framework, and the structure of the NIST Framework. We'll also explore why companies adopt the latest technology trends.
Exploring the NIST Cybersecurity Framework and its Components
The objective of this lesson is to understand the three main components of the NIST Framework, namely, the core, implementation tiers, and profiles.
Aims of the Framework
In this lesson, we'll standardise an unbiased cybersecurity framework, and understand the use of a durable cybersecurity framework. We'll also explore future regulation and compliance requirements, and the framework's flexibility.
Implementation and Benefits
In this lesson, we'll define quantifiable goals and commit to those goals. We'll identify and manage privacy risk in a business, and apply existing standards, guidelines, and practices to mitigate risk.
Functions of the Framework
This lesson will explore the five functions of a framework: identify, protect, detect, respond and recover.
Implementation of Risk Management on an Asset Using the NIST Framework
Manage information-system related security and privacy, understand how experienced representatives provide goals for an organisation, and learn about the planning, execution, and management of a project in development.
Decision-making and Implementing the Framework
Choosing the committee involved in decision making is an important task — you need to assess the committee, choose the administrator of the intervention, select a specialised advisory group and a community consulation committee. After today's lesson you will know exactly how to go about this process.