CYBR101 — Cybersecurity Fundamentals
Introduces cybersecurity through sociology and psychology lenses, covering phishing, spoofing, privacy, social engineering, and ethics while developing critical thinking and information literacy skills.
Learning Objectives & Matches
Identify and analyze social engineering attacks including phishing, pretexting, and baiting
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
Assess blockchain threats, such as untested code and unprotected keys.
Identify security system weaknesses, using penetration tests.
Identify security system weaknesses, using penetration tests.
Develop and execute tests that simulate the techniques of known cyber threat actors.
Coordinate vulnerability assessments or analysis of information security systems.
Identify or implement solutions to information security problems.
Gather cyber intelligence to identify vulnerabilities.
Evaluate privacy and security threats to individuals and organizations
Assess blockchain threats, such as untested code and unprotected keys.
Implement Web site security measures, such as firewalls or message encryption.
Identify, standardize, and communicate levels of access and security.
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
Coordinate vulnerability assessments or analysis of information security systems.
Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
Recommend information security enhancements to management.
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
Assess the quality of security controls, using performance indicators.
Apply ethical principles and professional standards to cybersecurity scenarios
Update corporate policies to improve cyber security.
Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
Maintain cyber defense software or hardware to support responses to cyber incidents.
Develop information security standards and best practices.
Write cyber defense recommendations, reports, or white papers using research or experience.
Develop and execute tests that simulate the techniques of known cyber threat actors.
Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
Recommend cyber defense software or hardware to support responses to cyber incidents.
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
Discuss security solutions with information technology teams or management.
Develop and implement security awareness programs and best practices
Develop information security standards and best practices.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Discuss security solutions with information technology teams or management.
Provide customers or installation teams guidelines for implementing secure systems.
Recommend information security enhancements to management.
Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
Design and implement Web site security measures, such as firewalls and message encryption.
Implement Web site security measures, such as firewalls or message encryption.
Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
Assess the quality of security controls, using performance indicators.
Assess cybersecurity risks and communicate findings to stakeholders