Cybersecurity and Networking Fundamentals

Cybersecurity    |    Beginner
  • 13 videos | 42m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 1199 users Rating 4.3 of 1199 users (1199)
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define security and describe why security is essential wherever data exists
    Provide an overview of the confidentiality, integrity, and availability (cia) triad
    Recognize essential security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures
    Describe the fundamentals of aaa services including identification, authentication, authorization, auditing, and accountability
    List common countermeasure techniques and strategies
    List factors to consider when evaluating risk
  • Describe how risks can be mitigated, accepted, transferred, and rejected
    Differentiate between security and usability
    Provide an overview of information flow and how it relates to cybersecurity
    Recognize the importance of information flow models and how they can help prevent unauthorized information flow in any direction
    Differentiate between common networking components such as servers, clients, ports, and protocols
    Recognize techniques used to gather valuable information about a system

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 215 users Rating 4.6 of 215 users (215)
Rating 4.4 of 4719 users Rating 4.4 of 4719 users (4719)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)