Program Overview:
Dooey Introduction to Cyber Security course for beginners is designed to give you
a foundational look at today’s cyber security landscape and provide you with the tools to
evaluate and manage security protocols in information processing systems.
Program Features:
- 4 hours of online self-paced learning
- 12 month access to self-paced learning
- Industry-recognized course completion certificate
- Industry examples and case studies
Delivery Mode:
Online Self learning.
Prerequisites:
There are no prerequisites to take this course. Anyone with an interest in the cybersecurity field
may take this course.
Target Audience:
The cyber security training for beginners is ideal for professionals in any organizational role
who would like to learn the fundamentals of cyber security and pursue a career in this booming
field. The cyber security course also caters to C-level executives and middle management
professionals who want to gain awareness of (and address) cyber security risks.
Key Learning Outcomes:
By the end of this online Introduction to Cyber Security course, you will be able to:
- Understand and become familiar with the cyber security field
- Develop and manage an information security program
- Know about cyber threats, vulnerabilities, and risks
- Perform business impact analysis, and carry out disaster recovery testing
- Gain knowledge on different types of security methods and network security controls
- Know more about security governance and risk management
Certification Details and Criteria:
- Complete the online self-learning course
- Complete the course-end assessment with a minimum 80% score
Course Curriculum:
Lesson 1 – Course Introduction
- Course Introduction
Lesson 2 – Cyber Security Fundamentals
- Introduction
- Fundamentals of Cyber Security
- Threat Actors, Attacks, and Mitigation
- Security Policies and Procedures
- Cybersecurity Mitigation Methods
- Key Takeaways
Lesson 3 – Enterprise Architecture and Components
- Introduction
- Secure Architecture
- Wireless Networks
- Network Security Controls
- Cloud, Virtualization, BYOD, and IoT Security
- Security Testing
- Key Takeaways
Lesson 4 – Information System Governance and Risk Assessment
- Introduction
- Information Security Governance
- Risk Management
- Information Security Programs
- Key Takeaways
Lesson 5 – Incident Management
- Introduction
- Developing an Incident Management and Response System
- Digital Forensics
- Business Continuity and Disaster Recovery
- Key Takeaways