Module 1 – Introduction to Cyber Security

Снимок экрана 2025-06-01 160337
Valiner
Last Update 03.06.2025
7 already enrolled

About This Course

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm.

Curriculum

82 Lessons

Introduction to Cybersecurity

Introduction to Cybersecurity
What Is Cybersecurity?
Safeguarding Your Personal Information
Your Data
Where Is Your Data?
What’s More…
Smart Devices
Identity Theft
Who Else Wants My Data?

Organizational Data

Before you can effectively apply best practices to protect data within an organization, you need a clear understanding of what kinds of data you're dealing with. Typically, there are two main types that are especially important to recognize. Let’s explore them now.

Scenario 1

Security breaches are becoming increasingly frequent, as cybercriminals continue to develop new and creative methods to break into organizations and steal sensitive information. Let’s take a look at one of the latest major cybersecurity incidents.

Cyber Attackers

Attackers can be individuals or organized groups who take advantage of security weaknesses for profit or personal benefit. As we've seen, their targets can include anything from financial data to proprietary business information.

Cyberwarfare

Cyberwarfare refers to the use of technological tools to infiltrate and assault the computer systems and networks of another country, aiming to inflict harm or interrupt critical services, like disabling an electrical power grid.

Quiz

You're about to take a quiz based on the material you've just covered. It includes fourteen questions, and you’ll need a minimum score of 70% to successfully pass.

Analyzing a Cyber Attack

Methods of Infiltration

Security Vulnerability and Exploits

Before we delve deeper, it’s helpful to understand some fundamental terms. A security vulnerability refers to any flaw or weakness found in software or hardware. When someone creates a program to exploit such a weakness, it is known as an exploit. Cybercriminals use these exploits to take advantage of vulnerabilities with the intention of accessing systems, stealing data, or reaching specific resources without permission.

The Cybersecurity Landscape

Have You Heard of Cryptocurrency? You’ve probably come across the term cryptocurrency, but do you actually understand what it is and how it functions? Let’s break it down and explore it in more detail.

Quiz

Protecting Your Devices and Network

You have likely come across the term "online security." It involves measures to protect your personal data from being accessed by unauthorized individuals.

Data Maintenance

Would you be comfortable sharing all your photos with strangers? Or your financial details with your friends? How about your email passwords with the general public? Probably not. That’s why protecting your data through encryption is essential.

Who Owns Your Data?

Safeguarding Your Online Privacy

Discover Your Own Risky Online Behavior

Quiz

Cybersecurity Devices and Technologies

No single device or technology can fully address all of an organization’s network security requirements. It’s essential to choose and combine the most effective tools as part of a comprehensive security strategy

Behavior Approach to Cybersecurity

Great work so far! You’re starting to understand how a security system is structured. Let’s keep going…

Cisco’s Approach to Cybersecurity

Quiz

Legal and Ethical Issues

Education and careers

Quiz

Course Final exam

End of Course Survey

Cybersecurity Fundamentals and Digital Safety: Practice Test

Your Instructors

Valiner

0/5
6 Courses
0 Reviews
18 Students
See more

Write a review

photo_2025-05-27_22-19-27
CHF 0.00
Level
All Levels
Lectures
82 lectures
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare