Describe the basic concepts of cybersecurity

Go to class
Write Review

Free Online Course: Describe the basic concepts of cybersecurity provided by Microsoft Learn is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
    • After completing this module, you will be able to:

      • Define what is cybersecurity
      • Describe the basic threat landscape
      • Describe different types of Malware
      • Describe basic mitigation strategies
    • Module 2: Describe concepts of cryptography
    • After completing this module, you will be able to:

      • Describe some of the basic concepts of cryptography
      • Describe encryption and is uses in cybersecurity
      • Describe hashing and digital signing
      • Describe the concept and use of digital certificates
    • Module 3: Describe authentication and authorization in cybersecurity
    • After completing this module, you will be able to:

      • Define authentication
      • Describe common authentication-based attacks
      • Describe authorization security techniques
    • Module 4: Describe basic networking concepts and how they relate to cybersecurity
      • Describe the basics of networks
      • Describe the threats to network security
      • Describe ways to protect your network
      • Describe ways to securely connect to and communicate over a network
    • Module 5: Describe device-based threats and security controls
      • Describe what your device knows about you
      • Describe how devices and become cybersecurity threats
      • Describe how to mitigate against device-related threats
    • Module 6: Describe application-based threats and security controls
      • Describe what are applications
      • Describe the threat landscape of applications
      • Describe how to protect your applications

Syllabus
    • Module 1: Describe basic cybersecurity threats, attacks, and mitigations
      • Introduction
      • Describe what is cybersecurity
      • Describe the threat landscape
      • Describe malware
      • Describe basic mitigation strategies
      • Knowledge check
      • Summary and resources
    • Module 2: Describe concepts of cryptography
      • Introduction
      • Describe cryptography
      • Describe encryption and its use in cybersecurity
      • Describe hashing and its application in digital signing
      • Describe digital certificates
      • Knowledge check
      • Summary and resources
    • Module 3: Describe authentication and authorization in cybersecurity
      • Introduction
      • Define authentication
      • Describe authentication-based attacks
      • Describe authorization security techniques
      • Knowledge check
      • Summary and resources
    • Module 4: Describe network-based threats and mitigations
      • Introduction
      • Describe the different types of networks
      • Describe how data moves around a network
      • Describe threats to network security
      • Protect your network
      • Knowledge check
      • Summary and resources
    • Module 5: Describe device-based threats and security controls
      • Introduction
      • Describe what your device knows about you
      • Describe how devices and become cybersecurity threats
      • Describe how to mitigate against device related threats
      • Knowledge check
      • Summary and resources
    • Module 6: Describe application-based threats and how to protect against them
      • Introduction
      • Describe what are applications
      • Describe the threat landscape of applications
      • Describe how to protect your applications
      • Knowledge check
      • Summary and resources