Security Foundations, Threats, and Network Protection
Instructor: Packt - Course Instructors
Beginner Level • 8 hours to complete Recommended experience • Flexible Schedule
What You'll Learn
- Understand cybersecurity fundamentals, including frameworks, controls, and risk management.
- Identify, analyze, and mitigate security threats, including social engineering and network attacks.
- Apply cryptographic principles, encryption techniques, and digital certificate management.
- Implement secure network architectures, firewalls, and identity access management solutions.
Skills You'll Gain
Identity and Access Management
Infrastructure Security
Public Key Infrastructure
Cyber Threat Intelligence
Information Systems Security
Threat Detection
Risk Management Framework
Threat Management
Cryptography
Encryption
Cyber Attacks
Key Management
Firewall
Cybersecurity
Authentications
Security Controls
Application Security
Threat Modeling
Network Security
Network Administration
Shareable Certificate
Earn a shareable certificate to add to your LinkedIn profile
Outcomes
-
Learn new concepts from industry experts
-
Gain a foundational understanding of a subject or tool
-
Develop job-relevant skills with hands-on projects
-
Earn a shareable career certificate
There are 6 modules in this course
In this module, we will introduce you to the CompTIA Security+ SY0-701 certification, outlining its importance, format, and key objectives. You will also get an overview of the course structure and expert guidance on how to prepare effectively for the exam. By the end of this module, you’ll have a clear roadmap to certification success.
In this module, we will cover fundamental security concepts that form the foundation of cybersecurity practices. You’ll explore the basics of information security, the role of cybersecurity frameworks, and the different types of security controls. Additionally, we’ll discuss organizational security roles and responsibilities to help you understand the broader security landscape.
In this module, we will explore the different types of threats that organizations face, from traditional cyberattacks to social engineering tactics. You’ll learn how threat actors operate, the methods they use to exploit vulnerabilities, and how organizations can mitigate risks. By the end of this section, you will have a deeper understanding of the evolving threat landscape.
In this module, we will delve into the world of cryptography, exploring the techniques used to protect data integrity and confidentiality. You’ll learn about encryption, hashing, digital certificates, and key management. Hands-on demonstrations will provide practical insights into implementing cryptographic solutions for securing sensitive information.
In this module, we will focus on identity and access management, a crucial aspect of cybersecurity. You’ll explore authentication methods, authorization solutions, and access control mechanisms that ensure only authorized users gain access to sensitive data and systems. Practical demonstrations will help reinforce key concepts and best practices.
In this module, we will explore how to secure enterprise network architectures by implementing best practices in network design, segmentation, and firewall management. You’ll learn about routing and switching security, intrusion detection systems, and remote access solutions. Hands-on demos will provide practical insights into configuring and securing enterprise networks.