CyberSecurity for Beginners
- Description
- Curriculum
- Reviews

-
1Course Introduction
Get an overview of the cybersecurity course, including key objectives, topics covered, and what to expect throughout the lessons.
-
2Threat Landscape
Discover the various types of cyber threats and understand the current digital threat landscape to better protect your information.
-
3Introduction to Computing devices
Explore the basics of various computing devices, their functions, and how they form the backbone of modern technology.
-
4Operating systems
Explore the fundamentals of operating systems, including their functions, components, and role in managing computer hardware and software.
-
5Servers Storage and Backups
Learn how to effectively manage and secure servers, storage systems, and backups to protect and maintain your organization's data.
-
6Computing Environments
Explore the different types of computing environments, including personal, enterprise, and cloud, and understand their unique features and security challenges.
-
7Maintenance and Patches
Learn how to keep your systems secure by regularly updating and applying patches to fix vulnerabilities and improve performance.
-
8Business Software
Learn how to secure business software against cyber threats in this introductory lesson.
-
9Email Apps
Learn how to secure your email apps against cyber threats in this practical cybersecurity lesson.
-
10Storage Solutions
Learn about various storage solutions, their advantages, and best practices to securely store data.
-
11Final Course assessment
Complete the final course assessment to test your understanding of all the cybersecurity concepts covered in this course.
-
12Course Wrap up
This final lesson summarizes the key points of the course, providing a comprehensive review of everything learned to reinforce your cybersecurity knowledge.
-
13Course introduction
This lesson introduces the key concepts and goals of the Networking and Cloud Computing module in our cybersecurity course.
-
14Types and Topologies
This lesson explores different types of network topologies and their unique characteristics in cloud computing.
-
15IP Addressing
This lesson explains how IP addressing works and its importance in networking and cloud computing.
-
16Infrastructure
This lesson covers the essential components and structure of networking and cloud computing infrastructure.
-
17Network Communication Models
This lesson explains the different models of network communication and how data is transmitted across networks.
-
18Protocols and ports
This lesson explains the essential networking protocols and ports that are crucial for secure and effective communication in cloud computing.
-
19Network Traffic monitoring
This lesson teaches you how to monitor network traffic to detect and prevent potential security threats.
-
20Network Client and Server
In this lesson, you will learn about the fundamental roles of network clients and servers, exploring how they communicate and collaborate in cloud computing environments.
-
21Firewalls and Security tools
In this lesson, you will learn about firewalls and essential security tools used to protect networks and cloud computing environments from cyber threats.
-
22Introduction to Azure
Learn the basics of Azure cloud computing, exploring its features and benefits for networking in cybersecurity.
-
23Virtual Environments
Learn how virtual environments in networking and cloud computing simulate physical hardware and software to enhance flexibility and efficiency in cybersecurity practices.
-
24Cloud Services
This lesson covers the basics of cloud services, explaining how they work and their benefits in networking and computing.
-
25X as A Service
This lesson explains the different types of 'X as a Service' (XaaS) models, such as SaaS, PaaS, and IaaS, and how they provide various cloud services to users.
-
26Final Course Project and Assessment
This lesson allows you to apply and demonstrate your understanding of networking and cloud computing concepts.
-
27Course wrap up
This final lesson reviews and summarizes the key concepts of networking and cloud computing covered in Module 2.
-
28Course introduction
This lesson introduces Module 3, covering key concepts about cybersecurity threats, attack vectors, and strategies for mitigation.
-
29Epic attacks
This lesson explores major cybersecurity attacks, their impacts, and the strategies used to mitigate them.
-
30Threats vectors
This lesson explains the different ways cyber threats can enter and impact a system, known as threat vectors.
-
31Mitigation Strategies
This lesson explains various strategies to effectively prevent and respond to cybersecurity threats.
-
32Encryption
This lesson explains how encryption works to protect data by converting it into a secure format that can only be read by authorized users.
-
33Public Private key and hashing
This lesson explains how public and private keys, along with hashing, are used to secure and verify information in cybersecurity.
-
34Digital Signing and certificates
In this lesson, you'll learn about digital signing and certificates, crucial for verifying the authenticity and integrity of digital information in cybersecurity.
-
35Authentication and Authorization
In this lesson, you'll learn about how systems verify identities (authentication) and determine access rights (authorization) to protect against cybersecurity threats.
-
36Data Transmission
The lesson on 'Data Transmission' explores how information travels across networks, focusing on security measures to protect against cyber threats.
-
37Security controls
Learn how security controls defend against cyber threats, ensuring safe digital environments in Module 3 of the cybersecurity course.
-
38Application Updates
'Application Updates' explores the importance of keeping software current to protect against cybersecurity threats, emphasizing best practices for maintaining security in digital environments.
-
39Security and Compliance Concepts
This lesson explores essential concepts in security and compliance to safeguard against cybersecurity threats, focusing on practical strategies for mitigation.
-
40ID and Active Directory
This lesson covers the basics of Identity and Access Management (IAM) and how Active Directory helps secure and manage user permissions in a network.
-
41Defense Models
This lesson explores different defense models used to protect against cybersecurity threats and mitigate risks.
-
42Final Course Project and Assessment
Here is the guide you need through the final project and assessment, testing your knowledge of cybersecurity threats, vectors, and mitigation strategies covered in Module 3.
-
43Course Wrap up
This final lesson reviews and summarizes the key concepts of cybersecurity threats, vectors, and mitigation strategies covered in Module 3.
-
44Course introduction
This introductory lesson provides an overview of identity and access solutions in Azure Active Directory, setting the stage for the topics covered in Module 4.
-
45Azure Active Directory
This lesson covers the fundamentals of Azure Active Directory and how it manages identities and access in the cloud.
-
46Azure Active Directory and Editions
This lesson explains the different editions of Azure Active Directory and their features.
-
47Azure Active Directory Identity types
This lesson explains the different types of identities used in Azure Active Directory.
-
48Authentication Methods
This lesson covers the different authentication methods available in Azure AD to secure user access.
-
49Multi Factor Authentication
This lesson explains how to enhance security in Azure AD by using Multi-Factor Authentication to verify user identities.
-
50Password Protection and Resetting
Learn how to securely manage and reset passwords within Azure Active Directory to enhance account protection and access control.
-
51Condition Access
Learn how to securely manage and reset passwords within Azure Active Directory to enhance account protection and access control.
-
52Roles and Role Based Access
This lesson explains how roles and role-based access control work in Azure Active Directory, focusing on managing permissions effectively.
-
53Identity Governance
The lesson on 'Identity Governance' explores how to manage and secure access to resources within Azure Active Directory, ensuring proper control and oversight of user identities.
-
54Privileged Identity Management and Protection
This lesson focuses on safeguarding and managing important identities within Azure AD, ensuring secure access and protection against potential threats.
-
55Final Course Project Assessment
The Final Course Project Assessment evaluates your understanding and application of Identify and Access Solutions in Azure AD, ensuring you can apply your knowledge effectively.
-
56Course Wrap up
This final lesson summarizes the essential aspects of Azure AD identity and access solutions covered in Module 4, ensuring a clear understanding of the course content.
-
57Course Introduction
This introductory lesson outlines the foundational principles and objectives of Microsoft Security Solutions explored in Module 5 of the cybersecurity course.
-
58Distributed Denial of Service DDOS Protection
"Distributed Denial of Service (DDOS) Protection" covers methods to safeguard against attacks that overwhelm networks or services, ensuring continuous availability and reliability of Microsoft security solutions.
-
59Azure Firewall Protection
In this lesson on 'Azure Firewall Protection,' you'll learn how to safeguard your Microsoft cloud environment using essential firewall security measures.
-
60Just In Time Access and Encryption
In this lesson, learn how "Just In Time Access and Encryption" enhances security by providing temporary and encrypted access only when needed, safeguarding data from unauthorized access.
-
61Introduction to Cloud Security
This lesson introduces fundamental concepts of cloud security, focusing on how Microsoft's solutions protect data and systems in the cloud environment.
-
62Virtual Security Solutions
In this lesson on 'Virtual Security Solutions,' we explore how Microsoft Security Solutions safeguard virtual environments, ensuring comprehensive protection for digital assets.
-
63Azure Standards and Policies
In this lesson, you'll learn about Azure's standards and policies to ensure secure and compliant use of Microsoft security solutions in your cybersecurity practices.
-
64Introduction to SIEM and SOAR
In this lesson, we introduce SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response), explaining their roles in enhancing cybersecurity through efficient monitoring and automated incident response.
-
65Defender Services
In this lesson on 'Defender Services', you'll learn about Microsoft's security solutions designed to protect and defend against cyber threats effectively.
-
66Endpoints and Cloud Apps Security
In this lesson, we explore how to secure both endpoints (devices) and cloud applications using Microsoft's security solutions.
-
67Identity Defence
In this lesson on 'Identity Defense' in Module 5 of the cybersecurity course, you'll learn how Microsoft Security Solutions protect and secure identities against digital threats.