Cybersecurity Threat Vectors and Mitigation (Coursera)

Cybersecurity Threat Vectors and Mitigation (Coursera)
Course Auditing
Categories
Effort
Certification
Languages
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybersecurity Threat Vectors and Mitigation (Coursera)
This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.

After completing this course, you’ll be able to:

• Describe the active threat landscape

• Describe common types of cyber attacks

• Classify different types of encryption algorithms

• Explain security and compliance concepts

This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.

This course is part of the Microsoft Cybersecurity Analyst Professional Certificate.


What you'll learn

- Gain a comprehensive understanding of the constantly evolving world of cyber threats, including the types of attacks and vulnerabilities that exist.

- Explore different encryption algorithms and their various applications, as well as the strengths and weaknesses of each type.

- Gain an understanding of key concepts in security and compliance, such as risk assessment, defense models, and regulatory requirements.


Syllabus


Threats and attacks

Module 1

Dive into the world of cyber threats and attacks and get to know the active threat landscape.


Cryptography

Module 2

Explore the cryptographic methods and standards used to protect data and secure communication.


Network and device-based threats

Module 3

Examine the various types of threats that can occur during data transmission, the importance of security controls in protecting against these threats, and the importance of keeping applications and devices updated to mitigate these risks.


Security, compliance and identity

Module 4

Explore the different laws, regulations, and industry standards that organizations must adhere to in order to ensure the security of their systems and data.


Cybersecurity threat vectors and mitigation

Module 5

Put your skills into practice by creating your own compliance strategy for the end-of-course project and reinforce your understanding of the key concepts you’ve learned.



MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Course Auditing
44.00 EUR/month
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.