Foundations of Cybersecurity Operations
In this course, you’ll learn how to strengthen cybersecurity operations by mastering core principles, modern threat management, and security response practices.
Segment 00: Reading - Welcome to the Course: Course Overview
Segment 01: Welcome and Course Goals
Segment 03: Chapter Introduction
Segment 04: Defining Cybersecurity: What it is and Why it Matters
Segment 05: The CIA Triad: Confidentiality, Integrity, and Availability
Segment 06: Core Cybersecurity Principles and Objectives
Segment 07: Overview of Cybersecurity Domains
Segment 08: Understanding Attack Surfaces and Critical Assets
Segment 09: Cybersecurity Frameworks: Guiding Operations
Segment 10: Key Roles and Teams in Cybersecurity Operations
Segment 11: The Importance of Cybersecurity Awareness and Training
Segment 12: The Cybersecurity Skills Gap and AI's Role
Segment 13: Reading - Security Architecture: What it is, Benefits, and Frameworks
Segment 14: Hands-On-Learning - Cybersecurity First Responder Scenario
Segment 15: Quiz - Foundations of Cybersecurity
Segment 16: Chapter Introduction
Segment 17: IAM Explained: The Four A's
Segment 18: Access Control Models and Least Privilege
Segment 19: Role-Based Access Control and Its Benefits
Segment 20: Multi-Factor Authentication (MFA) vs. Single-Factor Authentication
Segment 21: Introduction to Passwordless Authentication and Passkeys (FIDO)
Segment 22: Zero Trust Architecture: Principles and Implementation