Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
Getting Started with Cybersecurity
Getting Started with Cybersecurity
Curriculum
3 Sections
24 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 1: What Exactly Is Cybersecurity?
6
1.1
Cybersecurity Means Different Things to Different Folks
1.2
Quiz for Cybersecurity Means Different Things to Different Folks
5 Questions
1.3
Cybersecurity Is a Constantly Moving Target
1.4
Quiz for Cybersecurity Is a Constantly Moving Target
5 Questions
1.5
Looking at the Risks Cybersecurity Mitigates
1.6
Quiz for Looking at the Risks Cybersecurity Mitigates
5 Questions
Chapter 2: Getting to Know Common Cyberattacks
24
2.1
Attacks That Inflict Damage
2.2
Quiz for Attacks That Inflict Damage
6 Questions
2.3
Is That Really You? Impersonation
2.4
Quiz for Is That Really You? Impersonation
7 Questions
2.5
Messing around with Other People’s Stuff: Tampering
2.6
Quiz for Messing around with Other People’s Stuff: Tampering
5 Questions
2.7
Captured in Transit: Interception
2.8
Quiz for Captured in Transit: Interception
6 Questions
2.9
Taking What Isn’t Theirs: Data Theft
2.10
Quiz for Taking What Isn’t Theirs: Data Theft
6 Questions
2.11
Cyberbombs That Sneak into Your Devices: Malware
2.12
Quiz for Cyberbombs That Sneak into Your Devices: Malware
8 Questions
2.13
Poisoned Web Service Attacks
2.14
Quiz for Poisoned Web Service Attacks
5 Questions
2.15
Network Infrastructure Poisoning
2.16
Quiz for Network Infrastructure Poisoning
5 Questions
2.17
Bogus and Faulty Updates
2.18
Quiz for Bogus and Faulty Updates
5 Questions
2.19
Malvertising
2.20
Quiz for Malvertising
5 Questions
2.21
Stealing Passwords
2.22
Quiz for Stealing Passwords
8 Questions
2.23
Exploiting Maintenance Difficulties
2.24
Quiz for Exploiting Maintenance Difficulties
5 Questions
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack You
18
3.1
Advanced Attacks
3.2
Quiz for Advanced Attacks
6 Questions
3.3
Some Technical Attack Techniques
3.4
Quiz for Some Technical Attack Techniques
6 Questions
3.5
Bad Guys and Good Guys Are Relative Terms
3.6
Quiz for Bad Guys and Good Guys Are Relative Terms
5 Questions
3.7
Bad Guys Up to No Good
3.8
Quiz for Bad Guys Up to No Good
6 Questions
3.9
Cyberattackers and Their Colored Hats
3.10
Quiz for Cyberattackers and Their Colored Hats
6 Questions
3.11
Red Hats vs. Blue Hats
3.12
Quiz for Red Hats vs. Blue Hats
5 Questions
3.13
How Cybercriminals Monetize Their Actions
3.14
Quiz for How Cybercriminals Monetize Their Actions
5 Questions
3.15
Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
3.16
Quiz for Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
7 Questions
3.17
Defending against These Attackers
3.18
Quiz for Defending against These Attackers
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content