Introduction to Cyber Security


Introduction to Cyber Security training course will help in beginning cyber security to gain a complete overview of principles, concepts and designing a security program

SKU: 0a2339d366d1 Category:

Program Overview:

Dooey Introduction to Cyber Security course for beginners is designed to give you
a foundational look at today’s cyber security landscape and provide you with the tools to
evaluate and manage security protocols in information processing systems.

Program Features:

  • 4 hours of online self-paced learning
  • 12 month access to self-paced learning
  • Industry-recognized course completion certificate
  • Industry examples and case studies

Delivery Mode:

Online Self learning.


There are no prerequisites to take this course. Anyone with an interest in the cybersecurity field
may take this course.

Target Audience:

The cyber security training for beginners is ideal for professionals in any organizational role
who would like to learn the fundamentals of cyber security and pursue a career in this booming
field. The cyber security course also caters to C-level executives and middle management
professionals who want to gain awareness of (and address) cyber security risks.

Key Learning Outcomes:

By the end of this online Introduction to Cyber Security course, you will be able to:

  • Understand and become familiar with the cyber security field
  • Develop and manage an information security program
  • Know about cyber threats, vulnerabilities, and risks
  • Perform business impact analysis, and carry out disaster recovery testing
  • Gain knowledge on different types of security methods and network security controls
  • Know more about security governance and risk management

Certification Details and Criteria:

  • Complete the online self-learning course
  • Complete the course-end assessment with a minimum 80% score

Course Curriculum:

Lesson 1 – Course Introduction

  • Course Introduction

Lesson 2 – Cyber Security Fundamentals

  • Introduction
  • Fundamentals of Cyber Security
  • Threat Actors, Attacks, and Mitigation
  • Security Policies and Procedures
  • Cybersecurity Mitigation Methods
  • Key Takeaways

Lesson 3 – Enterprise Architecture and Components

  • Introduction
  • Secure Architecture
  • Wireless Networks
  • Network Security Controls
  • Cloud, Virtualization, BYOD, and IoT Security
  • Security Testing
  • Key Takeaways

Lesson 4 – Information System Governance and Risk Assessment

  • Introduction
  • Information Security Governance
  • Risk Management
  • Information Security Programs
  • Key Takeaways

Lesson 5 – Incident Management

  • Introduction
  • Developing an Incident Management and Response System
  • Digital Forensics
  • Business Continuity and Disaster Recovery
  • Key Takeaways