This course provides you with a foundational understanding of cybersecurity, basic incident handling, and essential security practices. By the end of the course, you’ll be well-prepared for more advanced studies and introductory roles in cybersecurity.
Learn why cybersecurity is important, explore career opportunities, and understand the role of cybersecurity professionals.
Get familiar with key terms like threat, vulnerability, risk, and learn the basic concepts of attack surfaces, threat actors, and layered security.
Understand the basics of assessing and mitigating risks, and how security policies are developed and enforced.
Explore the principles of Confidentiality, Integrity, and Availability, and see how they apply to real-world cybersecurity scenarios.
Discover how components like the CPU, RAM, storage, and peripherals work together to form a computer.
Compare different operating systems (Windows, Linux, macOS) and understand their roles in system security.
Learn how virtualization allows multiple operating systems on one machine and explore the basics of cloud computing.
Understand how data is stored, represented, and encoded in computers.
Learn to convert between these numbering systems, which are crucial for computing.
Discover the role of port numbers in networking and communication between devices.
Learn about different types of networks, standards, and topologies.
Study key networking protocols like TCP/IP, UDP, and DNS, and understand how they enable network communication.
Get to know the functions and security considerations of routers, switches, and firewalls.
Learn basic network security configurations and how to secure small-scale networks.
Explore Wi-Fi and Bluetooth security, focusing on best practices for protecting wireless networks.
Practice viewing and analyzing network settings on Windows using built-in tools.