Free Training
Premium Training
Tuition & Scholarships
Certification and Badging
Cybersecurity Fundamentals V2
Part two of our three-part Cybersecurity Foundations training pathway.
In this course, you'll...
-
Understand the Cybersecurity Industry: encompassing its application in physical, network, system, and data security contexts, across various domains
-
Learn Cryptographic Concepts: including hashing and encoding for data integrity and secure representation
-
Operate ELK as a SIEM: to develop expertise in log inspection for Windows and Linux systems, and identify malicious activity
-
Work with Cyber Threat Intelligence: to understand the utilization of actionable, timely, and relevant information for identifying, comprehending, and mitigating cybersecurity threats
Cybersecurity Fundamentals Curriculum
Check out the syllabus here: All Fundamentals Syllabus and some screenshots from labs you'll complete below:
-
Cybersecurity Industry
-
Contexts of Security
-
Security Controls
-
CIA Triad and Defense in Depth
-
IAM Zero Trust and Cyber Hygiene
-
Cyber Threats and Nation State Threat Actors
-
Threat Actors Continued
-
Threat Vectors
-
Knowledge Check: Cybersecurity Industry
-
-
Cryptography
-
What is Cryptography?
-
Hashing, Encoding, Symmetric & Asymmetric Encryption
-
Lab: Hashing and Encoding
-
Lab: Ciphers and Symmetric Encryption
-
Lab: Asymmetric Encryption
-
Lab: Digital Signatures & Certificates
-
Lab: Cooking with the Cyberchef
-
Knowledge Check: Cryptography
-
Challenge: Encrypt a Message to the Community!
-
-
Logging for Security
-
Logs and Sources
-
SIEM and SOAR
-
Lab: Windows Event Logs
-
Lab: Linux Logs
-
Lab: Intro to ELK and Queries
-
Lab: ELK Investigation
-
Lab: Intrusion Detection with YARA
-
Knowledge Check: Logging for Security
-
Challenge: All Seeing YARA
-
-
Cyber Threat Intelligence
-
Cyber Threat Intelligence (CTI)
-
CTI Types and Sources
-
CTI Lifecycle and MITRE ATT&CK
-
Lab: Industry Breach Reports with Verizon DBIR
-
Lab: Threat Actor Report Analysis
-
Lab: Threat Actor TTPs with MITRE ATT&CK
-
Lab: Cyber Kill Chain, Pyramid of Pain, Diamond Model
-
Knowledge Check: Cyber Threat Intelligence
-
Challenge: Intelligence on Indicators of Compromise
-
-
Cybersecurity Fundamentals Assessment
-
Assessment: Cybersecurity Fundamentals
-
Survey: Cybersecurity Fundamentals Course Feedback
-
Cybersecurity Fundamentals is part of our Cybersecurity Foundations training pathway.
Because each course builds off its predecessor, we strongly recommend completing the Cybersecurity Foundations training pathway in this order:
-
IT Fundamentals
-
Cybersecurity Fundamentals (You are here!)
-
Compliance Fundamentals