Introduction to asset security-Get started with the course
Introduction to Course 5
()
Course 5 overview
Helpful resources and tips
Da'Queshia: My path to cybersecurity
()
Introduction to asset security-Introduction to assets
Welcome to module 1
()
The what, why, and how of asset security
()
Understand risks, threats, and vulnerabilities
Tri: Life in asset security
()
Security starts with asset classification
()
Common classification requirements
Activity Exemplar: Classify the assets connected to a home network
Introduction to asset security-Digital and physical assets
Assets in a digital world
()
The emergence of cloud security
Introduction to asset security-Risk and asset security
Elements of a security plan
()
The NIST Cybersecurity Framework
()
Security guidelines in action
Activity Exemplar: Score risks based on their likelihood and severity
Introduction to asset security-Review: Introduction to asset security
Wrap-up
()
Glossary terms from module 1
Protect organizational assets-Safeguard information
Welcome to module 2
()
Security controls
()
Principle of least privilege
The data lifecycle
Information privacy: Regulations and compliance
Heather: The importance of protecting PII
()
Activity Exemplar: Determine appropriate data handling practices
Protect organizational assets-Encryption methods
Fundamentals of cryptography
()
Public key infrastructure
()
Symmetric and asymmetric encryption
Resources for completing labs
Lab tips and troubleshooting steps
Non-repudiation and hashing
()
The evolution of hash functions
Protect organizational assets-Authentication, authorization, and accounting
Access controls and authentication systems
()
The rise of SSO and MFA
The mechanisms of authorization
()
Why we audit user activity
()
Tim: Finding purpose in protecting assets
()
Identity and access management
Activity Exemplar: Improve authentication and authorization for a small business
Protect organizational assets-Review: Protect organizational assets
Wrap-up
()
Glossary terms from week 2
Vulnerabilities in systems-Flaws in the system
Welcome to module 3
()
Vulnerability management
()
Defense in depth strategy
()
Common vulnerabilities and exposures
()
The OWASP Top 10
Open source intelligence
Vulnerabilities in systems-Identify system vulnerabilities
Vulnerability assessments
()
Approaches to vulnerability scanning
The importance of updates
Omad: My learning journey into cybersecurity
()
Penetration testing
Portfolio Activity Exemplar: Analyze a vulnerable system for a small business
Vulnerabilities in systems-Cyber attacker mindset
Protect all entry points
()
Approach cybersecurity with an attacker mindset
Types of threat actors
Niru: Adopt an attacker mindset
()
Pathways through defenses
()
Fortify against brute force cyber attacks
Activity Exemplar: Identify the attack vectors of a USB drive
Vulnerabilities in systems-Review: Vulnerabilities in systems
Wrap-up
()
Glossary terms from module 3
Threats to asset security-Social engineering
Welcome to module 4
()
The criminal art of persuasion
()
Social engineering tactics
Phishing for information
()
Types of phishing
Threats to asset security-Malware
Malicious software
()
An introduction to malware
The rise of cryptojacking
()
Threats to asset security-Web-based exploits
Cross-site scripting (XSS)
()
Exploitable gaps in databases
()
Prevent injection attacks
Threats to asset security-Threat modeling
A proactive approach to security
()
Chantelle: The value of diversity in cybersecurity
()
PASTA: The Process for Attack Simulation and Threat Analysis
()
Traits of an effective threat model
Activity Exemplar: Apply the PASTA threat model framework
Threats to asset security-Review: Threats in cybersecurity
Wrap-up
()
Glossary terms from module 4
Threats to asset security-Congratulations on completing course 5
Course wrap-up
()
Course 5 glossary
Get started on the next course