product_image

            Introduction to Cybersecurity Concepts and Practices

            $131

            Start Today!

            Add to cart

            Professional Credits:

            CEU: 0.5
            ATD CI: 5
            HRCI: 5
            PDU: 5
            SHRM: 5

            $131

            Start Today!

            Add to cart

            Completion Time

            5 hours

            Access Time

            90 Days

            Outcome

            Individual Skill Course

            Language

            English

            Training Level

            Beginner

            Delivery Information:

            Online Asynchronous Self-paced

            Description

            Introduction to Cybersecurity Concepts and Practices is intended for adult professionals who may be entertaining a career in cybersecurity or are looking to enhance their current career skills with a stronger understanding of cybersecurity. The training course provides a wide array of topics pertinent to the modern workplace. It outlines broad concepts such as cryptography, cloud computing, and malware and then provides the resources to apply these concepts in present-day areas, such as networking, incident management, and authentication.

            This Introduction to Cybersecurity Concepts and Practices course is offered in collaboration with the trusted learning partner MindEdge.

            Learning Outcomes

            After completing this course, the learner should be able to:
            • Understand how cybersecurity maps to the goals of confidentiality, integrity, and availability
            • Describe how technologies like cryptography assist in the objectives of cybersecurity
            • Identify the characteristics of cloud-computing and how it impacts security considerations
            • Explain how physical security relates to cybersecurity
            • Develop the components of a security awareness program
            • Identify the different means of achieving authentication and their strengths and weaknesses
            • Define data classification and its role in securing critical information
            • Describe technologies used by networking to detect and prevent attacks
            • Distinguish the threats specific to mobile platforms
            • Understand the next steps for pursuing a career in cybersecurity

            $131

            Start Today!
            Add to cart