Course curriculum

  • 1

    Welcome to the Introduction to Cyber Security Fundamentals Training Course

    • Course Introduction Overview

  • 2

    Chapter 1

    • Chapter 1 Overview: Overview of Security

    • CIA Triad Video

    • Threat Actors Video

    • Read Chapter 1: Overview of Security

    • Quiz #1 Overview of Security

  • 3

    Chapter 2

    • Chapter 2 Overview: Cyber Threat Intelligence

    • Read Chapter 2: Cyber Threat Intelligence

    • Quiz #2 CTI

  • 4

    Chapter 3

    • Chapter 3 Overview: Malware

    • Malware Types Video

    • Read Chapter 3: Malware

    • Quiz #3 Malware

  • 5

    Chapter 4

    • Chapter 4 Overview: Security and Applications

    • Read Chapter 4: Security Devices and Applications

    • Quiz #4 Security Devices and Applications

  • 6

    Chapter 5

    • Chapter 5 Overview: Mobile Device Security

    • Read: Chapter 5 Mobile Device Security

    • Quiz #5 Mobile Device Security

  • 7

    Chapter 6

    • Chapter 6 Overview: Hardening

    • Read Chapter 6: Hardening

    • Quiz #6 Hardening

  • 8

    Chapter #7

    • Chapter 7 Overview: Virtualization

    • Read Chapter 7: Virtualization

    • Quiz #7 Virtualization

  • 9

    Chapter #8

    • Chapter 8 Overview: Secure Software Deployment

    • Read Chapter 8: Secure Software Deployment

    • Quiz #8 SDLC Principles

  • 10

    Chapter #9

    • Chapter 9 Overview: Network Design

    • Read Chapter 9: Network Design

    • Quiz #9 Network Design

  • 11

    Chapter #10

    • Chapter 10 Overview: Network Attack Types

    • Read Chapter 10: Network Attack Types

    • Quiz #10 Network Attacks

  • 12

    Chapter #11

    • Chapter 11 Overview: Securing Networks

    • Read Chapter 11: Securing Networks

    • Quiz #11 Securing Networks

  • 13

    Chapter #12

    • Chapter 12 Overview: Physical Security

    • Read Chapter 12: Physical Security

    • Quiz #12 Physical Security

  • 14

    Chapter #13

    • Chapter 13 Overview: Authentication

    • Read Chapter 13: Authentication

    • Quiz #13 Authentication

  • 15

    Chapter #14

    • Chapter 14 Overview: Access Control Methods

    • Read Chapter 14: Access Control Methods

    • Quiz #14 Access Control

  • 16

    Chapter #15

    • Chapter 15 Overview: Risk Management

    • Read Chapter 15: Risk Management

    • Quiz #15 Risk Management

  • 17

    Chapter #16

    • Chapter 16 Overview: System Monitoring

    • Read Chapter 16: System Monitoring

    • Quiz #16 System Monitoring

  • 18

    Chapter #17

    • Chapter 17 Overview: Cryptography

    • Read Chapter 17: Cryptography

    • Quiz #17 Cryptography

  • 19

    Chapter #18

    • Chapter 18 Overview: Security Protocols

    • Read Chapter 18: Security Protocols

    • Quiz #18 Security Protocols

  • 20

    Chapter 19

    • Chapter 19 Overview: Business Continuity

    • Read Chapter 19: Business Continuity

    • Quiz #19 Business Continuity

  • 21

    Chapter 20

    • Chapter 20 Overview: Social Engineering

    • Read Chapter 20: Social Engineering

    • Quiz #20 Social Engineering

  • 22

    Chapter 21

    • Chapter 21 Overview: Data Classification

    • Read Chapter 21: Data Classification

    • Quiz #21 Data Classification

  • 23

    Chapter 22

    • Chapter 22 Overview: Policies and Procedures

    • Read Chapter 22: Policies and Procedures

    • Quiz #22 Policies and Procedures

  • 24

    Certification Exam & Course Recap

    • Training Recap

    • Certificate of Completion Exam

    • Congratulations!