Course Content
Cybersecurity Architecture Deep Dive
In this section you will learn all about what is cybersecurity architecture as it specifies the organizational structure, functional behavior, standards, and policies of a computer network
0/3
NIST Cybersecurity Framework
In this section you will learn NIST: National Institute of Standards and Technology including Cyber risk, COBIT 5, ISO 27000 series, and DSS05
0/3
COBIT 5 Fundamentals
In this section you will learn about COBIT 5 framework
0/3
Common Type of Cybersecurity Threats and Cybersecurity Attacks
In this section you will the Common Type of Cybersecurity Threats and Cybersecurity Attacks for better understanding
0/4
Top Cybersecurity Tools and Trends
In this section you will learn various Cybersecurity tools and trends that you can use for Ethical Hacking purposes for your organization
0/1
Advanced Penetration Testing Using Python
In this section you will learn how to use various tools and techniques to ethically hack networks and become proficient with various penetration testing tools
0/6
Resources – Download
In this section you will download all resources and Kali Linux Python source code
0/1
Architecting a Cybersecurity Solution
About Lesson

In this lecture you will learn the structure of this course and set course expectations:

In this course you will learn:

  • NIST (National Institute of Science and Technology) Cybersecurity framework

  • Cyber risks

  • COBIT 5 and DSS05

  • Kali Linux for penetration testing your network

  • Using Python, conduct hands-on SSL Port Scans, SQL Injection, Brute Force, Sniffers and more.

  • Learn how to implement control frameworks

  • Understand Cyber essential framework and IT security

  • Work with security threats, malware, cyber crime, callbacks, ransomware, and rootkits

  • Understand advanced persistent threats (APTs)

  • Learn how to architect a security risk

  • Work with managing user access and identity

  • Implementing preventative security, monitoring, and setting alerts

  • Be able to successfully prepare, manage, and respond to incidents, and much more…

0% Complete