Empower your entire team
to safeguard against cyber security threats.
Get Started!
View Course

An online course for people who want to learn.

For Any Business & Organization Today
InstructorAnders Erickson
TypeOnline Course
Student Enrolled14
Buy NowBook Now

Cybersecurity For Non-Experts

Learn important concepts including: – Key cybersecurity risks such as threat agents and attack vectors – Security applications and appliances like IDS and IPS systems – Cybersecurity policies and procedures that happen on the front line – Regulations that govern technology as in PCI DSS and ISO 27001 This cybersecurity e-learning course is beneficial for staff across a wide array of organizations, including federal, state, and local government groups, nonprofit organizations and public and private companies. This course gives you on-demand content with an overview of cybersecurity language, concepts, and caveats. 4 HOURS – CERTIFICATE OF COMPLETION OFFERED
Section 1Introduction to the Course
Section 1.0Introduction to the CourseFree Preview

Learning Objectives

  • What lies ahead
  • The shift in how we live and work
  • Speak the language
  • What’s at stake
  • In-depth familiarity with layers
Section 1.1Daily Use of Cyber
Section 1.2Cyber Definitions
Section 1.3Why Can't We Just Unplug?
Section 1.4Layers to Security
Section 2Cyber risk questions
Section 2.0Cyber risk questions
Section 2.1Moving into The Cloud
Section 2.2Proactive IT conversations
Section 3Security applications & appliances
Section 3.0Security applications & appliances
Section 3.1Today’s largest threat: malware
Section 3.2What if hardware fails?
Section 3.3Blockchain: the future
Section 3.4Prevent & minimize breaches
Section 3.5Questions to ask now
Section 4Cybersecurity policies and procedures
Section 4.0Policy vs. procedure
Section 4.1Resumption planning
Section 4.2Risk iceberg
Section 4.3Risk assessment & email
Section 4.4Offensive security
Section 5Regulations that govern technology
Section 5.0Regulations governing tech
Section 5.1Ensure compliance
Section 5.2An active breach
Section 5.3Post breach: what now?
Section 5.4Cyber culture/Q&A
Section 6Let’s review cybersecurity basics
Section 6.0Course summary
Section 6.1Survey: your feedback

Learn At Your Own Pace

Be in control! Study when you are at your peak, whether that’s early morning or late at night. Balance your work, studies and family commitments just the way you want.

Access Anytime, Anywhere!

Forget fighting traffic, leave work early to go to class, or miss important family time. It’s all in your fingertips!

Empower Yourself

Grow your knowledge to safeguard against rising cyber security treats everyday.

Protect Your Business Today!

Inform and empower with tools and insights as well as a practical understanding of cybersecurity.

Get Started!