What you'll learn
Recognize core skills and knowledge needed to become a cybersecurity analyst
Identify how security attacks impact business operations
Explain security ethics
Identify common tools used by cybersecurity analysts
Skills you'll gain
Category: Security Hardening
Security Hardening
Category: Network Security
Category: Transmission Control Protocol / Internet Protocol (TCP/IP)
Transmission Control Protocol / Internet Protocol (TCP/IP)
Category: Network Architecture
Network Architecture
Category: Cloud Networks
Cloud Networks
Play It Safe: Manage Security Risks
What you'll learn
Identify the primary threats, risks, and vulnerabilities to business operations
Examine how organizations use security frameworks and controls to protect business operations
Define commonly used Security Information and Event Management (SIEM) tools
Use a playbook to respond to threats, risks, and vulnerabilities
Skills you'll gain
Category: Information Security (INFOSEC)
Information Security (INFOSEC)
Category: NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
Category: Security Audits
Security Audits
Category: NIST Cybersecurity Framework (CSF)
NIST Cybersecurity Framework (CSF)
Category: Incident Response Playbooks
Incident Response Playbooks
Connect and Protect: Networks and Network Security
What you'll learn
Define the types of networks and components of networks
Illustrate how data is sent and received over a network
Understand how to secure a network against intrusion tactics
Describe system hardening techniques
Skills you'll gain
Category: Command line interface (CLI)
Command line interface (CLI)
Category: SQL
SQL
Category: Linux
Linux
Category: Bash
Bash
Tools of the Trade: Linux and SQL
What you'll learn
Explain the relationship between operating systems, applications, and hardware
Compare a graphical user interface to a command line interface
Navigate and manage the file system using Linux commands via the Bash shell
Use SQL to retrieve information from a database
Skills you'll gain
Category: escalation
escalation
Category: resume and portfolio preparation
resume and portfolio preparation
Category: stakeholder communication
stakeholder communication
Category: Job preparedness
Job preparedness
Category: integrity and discretion
integrity and discretion
Assets, Threats, and Vulnerabilities
What you'll learn
Classify assets
Analyze an attack surface to find risks and vulnerabilities
Identify threats, such as social engineering, malware and web-based exploits
Summarize the threat modeling process
Skills you'll gain
Category: Authentication
Authentication
Category: vulnerability assessment
vulnerability assessment
Category: Cryptography
Cryptography
Category: asset classification
asset classification
Category: threat analysis
threat analysis
Sound the Alarm: Detection and Response
What you'll learn
Identify the steps to contain, eradicate, and recover from an incident
Analyze packets to interpret network communications
Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
Skills you'll gain
Category: Cybersecurity
Cybersecurity
Category: Information Security (INFOSEC)
Information Security (INFOSEC)
Category: Ethics in cybersecurity
Ethics in cybersecurity
Category: NIST Cybersecurity Framework (CSF)
NIST Cybersecurity Framework (CSF)
Category: Historical Attacks
Historical Attacks
Automate Cybersecurity Tasks with Python
What you'll learn
Explain how the Python programming language is used in cybersecurity
Create new, user-defined Python functions
Use regular expressions to extract information from text
Practice debugging code
Skills you'll gain
Category: Security Information and Event Management (SIEM) tools
Security Information and Event Management (SIEM) tools
Category: Packet Analyzer
Packet Analyzer
Category: Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)
Put It to Work: Prepare for Cybersecurity Jobs
What you'll learn
Determine when and how to escalate a security incident
Engage with the cybersecurity community
Find and apply for cybersecurity jobs
Prepare for job interviews
Skills you'll gain
Category: Computer Programming
Computer Programming
Category: Python Programming
Python Programming
Category: Coding
Coding
Category: PEP 8 style guide
PEP 8 style guide