Course curriculum

  • 1

    Welcome to the course!

  • 2

    Module 1: Basic Principles of Cybersecurity

    • Segment - 01 - Welcome to the course
    • Segment - 02 - Introductory Remarks
    • Segment - 03 - What is Cybersecurity?
    • Segment - 04 - Fundamental tenets of cybersecurity
  • 3

    Module 2: Evolving Threat Landscape

    • Segment - 05 - Photo or information leakage
    • Segment - 06 - Threat Landscape 
    • Segment - 07 - Endless security incident
  • 4

    Module 3: Cyber Security Concept and Standards

    • Segment - 08 - attack-surface
    • Segment - 09 - Malware and Vulnerabilities
    • Segment - 10 - The open SCAP Project
    • Segment - 11 - The Center for Internet Security
    • Segment - 12 - Malware and Vulnerability Scanners 
    • Segment - 13 - The Cloud Controls Matrix (CCM) 
    • Segment - 14 - The Open Web Application Security Project-(OWSAP) 
    • Segment - 15 - Federal Information Processing Standards (FIPS)
    • Segment - 16 - Identifying and scoring vulnerabilities
    • Segment - 17 - National Checklist Program (NCP)
  • 5

    Module 4: Compliance & Data Privacy

    • Segment - 18 - Compliance & Data Privacy
  • 6

    Module 5: Cybersecurity culture

    • Segment - 19 - What is Cybersecurity Culture?
    • Segment - 20 - Why is it important in the workplace?
    • Segment - 21 - How to measure the level and track changes?
  • 7

    Module 6: Security Personal Skills Shortage

    • Segment - 22 - Security Personal Shortage