Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Introduction to Cybersecurity

Description

Start learning about cybersecurity! This course will cover a range of introductory cybersecurity topics.

### Why Learn Cybersecurity?

Data is valuable. With so much sensitive information online, companies need cybersecurity pros to protect it. This course is a great starting point for anyone interested in cybersecurity, but not sure where to start. Build your foundation by learning the fundamentals of one of the fastest-growing fields today.

### Take-Away Skills

Learn the basic concepts needed to identify and protect yourself against common cyber threats and attacks. You’ll also gain an understanding of principles and policies, commonly used authentication/authorization techniques, and network security fundamentals.


Tags

Syllabus

  • What is Cybersecurity?: What does cybersecurity mean and encompass? Let's dive in!
    • Article: What Is Cybersecurity?
    • Article: The Cybersecurity Industry
    • Quiz: What is Cybersecurity Quiz
  • History & Cybersecurity Standards: Learn how cybersecurity evolved as a field, and what standards, regulations, and frameworks arose to respond to evolving cyber threats.
    • Informational: Introducing Cybersecurity History & Standards
    • Article: The Evolution of Cybersecurity
    • Article: Security Standards, Regulations, & Frameworks
  • Cyber Threats: Learn about cyberattacks and how to avoid them. You'll explore Malware, SQL Injection, Cross Site Scripting, Zero-Day Attacks, and more!
    • Informational: Introduction to Cyber Threats
    • Lesson: Malware
    • Quiz: Malware Quiz
    • Article: Phishing
    • Article: SQL Injection
    • Article: Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF)
    • Article: Zero-Day & DDoS Attacks
  • Cryptography, Authentication, & Authorization: What's cryptography? What's the difference between authentication and authorization? How do we keep our data secure online?
    • Informational: Introduction to Cryptography, Authentication, & Authorization
    • Article: Practical Cryptography: Encryption
    • Article: Practical Cryptography: Hashing
    • Article: Authentication & Authorization
    • Project: Decrypt Secret Messages
  • Network Security Basics: Learners will understand how data travels through a network, how to defend against malicious traffic, and how to configure a basic firewall.
    • Informational: Introduction to Network Security
    • Lesson: Network Basics
    • Quiz: Practice Network Basics Concepts
    • Article: Firewalls
    • Article: Project: Packet-Filtering Firewall
    • Article: Wireless Network Security
    • Article: Tutorial: Network Monitoring
  • Securing Your Personal Devices: You will learn about some best practices and implement them. Pick up some security best practices for all your accounts and devices!
    • Informational: Introduction to Personal Security
    • Article: Personal Security Best Practices
    • Article: Personal Security: Hardening Your Device
    • Article: Windows Hardening
    • Article: Linux Hardening
  • Case Studies & Looking Ahead: Now that you've learned about a variety of security practices, let's look at case studies and exciting future developments in Cybesecurity.
    • Informational: Case Studies & Looking Ahead
    • Article: Case Studies: Notable Breaches
    • Article: Trending Topics in Cybersecurity (2020s)
    • Article: Introduction to Cybersecurity Survey

Online Course


Introduction to Cybersecurity

Affiliate notice

Start learning about cybersecurity! This course will cover a range of introductory cybersecurity topics.

### Why Learn Cybersecurity?

Data is valuable. With so much sensitive information online, companies need cybersecurity pros to protect it. This course is a great starting point for anyone interested in cybersecurity, but not sure where to start. Build your foundation by learning the fundamentals of one of the fastest-growing fields today.

### Take-Away Skills

Learn the basic concepts needed to identify and protect yourself against common cyber threats and attacks. You’ll also gain an understanding of principles and policies, commonly used authentication/authorization techniques, and network security fundamentals.


  • What is Cybersecurity?: What does cybersecurity mean and encompass? Let's dive in!
    • Article: What Is Cybersecurity?
    • Article: The Cybersecurity Industry
    • Quiz: What is Cybersecurity Quiz
  • History & Cybersecurity Standards: Learn how cybersecurity evolved as a field, and what standards, regulations, and frameworks arose to respond to evolving cyber threats.
    • Informational: Introducing Cybersecurity History & Standards
    • Article: The Evolution of Cybersecurity
    • Article: Security Standards, Regulations, & Frameworks
  • Cyber Threats: Learn about cyberattacks and how to avoid them. You'll explore Malware, SQL Injection, Cross Site Scripting, Zero-Day Attacks, and more!
    • Informational: Introduction to Cyber Threats
    • Lesson: Malware
    • Quiz: Malware Quiz
    • Article: Phishing
    • Article: SQL Injection
    • Article: Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF)
    • Article: Zero-Day & DDoS Attacks
  • Cryptography, Authentication, & Authorization: What's cryptography? What's the difference between authentication and authorization? How do we keep our data secure online?
    • Informational: Introduction to Cryptography, Authentication, & Authorization
    • Article: Practical Cryptography: Encryption
    • Article: Practical Cryptography: Hashing
    • Article: Authentication & Authorization
    • Project: Decrypt Secret Messages
  • Network Security Basics: Learners will understand how data travels through a network, how to defend against malicious traffic, and how to configure a basic firewall.
    • Informational: Introduction to Network Security
    • Lesson: Network Basics
    • Quiz: Practice Network Basics Concepts
    • Article: Firewalls
    • Article: Project: Packet-Filtering Firewall
    • Article: Wireless Network Security
    • Article: Tutorial: Network Monitoring
  • Securing Your Personal Devices: You will learn about some best practices and implement them. Pick up some security best practices for all your accounts and devices!
    • Informational: Introduction to Personal Security
    • Article: Personal Security Best Practices
    • Article: Personal Security: Hardening Your Device
    • Article: Windows Hardening
    • Article: Linux Hardening
  • Case Studies & Looking Ahead: Now that you've learned about a variety of security practices, let's look at case studies and exciting future developments in Cybesecurity.
    • Informational: Case Studies & Looking Ahead
    • Article: Case Studies: Notable Breaches
    • Article: Trending Topics in Cybersecurity (2020s)
    • Article: Introduction to Cybersecurity Survey