Introduction to Cybersecurity Fundamentals -Lesson 1: Introduction: Fundamentals of Cybersecurity
Welcome to the Course: Lesson Overview
Meet Your Instructor
()
Getting Started: Defining Cybersecurity
()
Reviewing The Security Model: Authentication
()
Your Data Online: Confidentiality, Integrity, & Availability
()
Key Concepts: Authorization & Non-Repudiation
()
Additional Resources
Introduction to Cybersecurity Fundamentals -Lesson 2: Common Cybersecurity Threats and Attacks
Top 4: The Most Common Cyber Attacks
()
The Psychology Behind Cyber Attacks
()
Playing Defense Through Risk Mitigation
()
Additional Resources
Introduction to Cybersecurity Fundamentals -Lesson 3: Cybersecurity Best Practices
Going Beyond Traditional Passwords
()
Three Key Elements For Authentication
()
Vulnerability Alert: Email Spoofing
()
Top 6: Keys For Securing Your Emails At Work
()
Additional Resources
Introduction to Cybersecurity Fundamentals -Lesson 4: Data Protection and Privacy
Identifying Different Types Of Data
()
Protecting Data Through Encryption
()
Protecting Data Through Deletion (Part 1)
()
Protecting Data Through Deletion (Part 2)
()
Additional Resources
Introduction to Cybersecurity Fundamentals -Lesson 5: Incident Response (IR) and Reporting Best Practices
The Framework Of IR
()
The Early Steps Of The IR Process
()
The Final Steps of the IR Process
()
Additional Resources
Introduction to Cybersecurity Fundamentals -Conclusion and Final Assessment
Conclusion & Takeaways
()
Documentation and Reporting
()