Semester 1: Foundations of Cybersecurity
https://static.wixstatic.com/media/9638ce_25cca7a7883243e6aad052dd5ce32bfc~mv2.png
Semester 2: Play It Safe: Manage Security Risks
https://static.wixstatic.com/media/9638ce_3667e90c0947470cb1974f4ed642e0b3~mv2.png
About this Course
This is the second course in the Univad Diploma in Cybersecurity. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Univad Diploma in Cybersecurity.
In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.
Course Syllabus
Security domains
• Introduction to Course 2
• Reading: Course 2 overview
• Reading: Helpful resources and tips
• Reading: Connect with your classmates
• Welcome to module 1
• Explore the CISSP security domains, Part 1
• Explore the CISSP security domains, Part 2
• Reading: Security domains cybersecurity analysts needs
• Ashley: My path to cybersecurity
• Practice Quiz: Test your knowledge: CISSP security domains
• Threats, risks, and vulnerabilities
• Herbert: Manage threats, risks, and vulnerabilities
• NIST’s Risk Management Framework
• Reading: Manage common threats, risks, and vulnerabilities
• Practice Quiz: Navigate threats, risks, and vulnerabilities
• Wrap-up
• Reading: Glossary terms from module 1
Security frameworks and control
• Welcome to module 2
• Frameworks
• Controls
• Reading: The relationship between frameworks and controls
• Practice Quiz: More about frameworks and controls
• Explore the CIA triad
• Reading: Use the CIA triad to protect organizations
• Practice Quiz: Test your knowledge: The CIA triad
• NIST frameworks
• Explore the functions of the NIST Cybersecurity Framework
• Practice Quiz: Test your knowledge: NIST frameworks
• OWASP security principles
• Reading: More about OWASP security principles
• Wajih: Stay up-to-date on the latest cybersecurity threats
• Plan a security audit
• Complete a security audit
• Reading: More about security audits
• Practice Quiz: OWASP principles and security audits
• Reading: Portfolio Activity: Conduct a security audit
• Wrap-up
• Reading: Glossary terms from module 2
Introduction to cybersecurity tools
• Welcome to module 3
• Logs and SIEM tools
• SIEM dashboards
• The future of SIEM tools
• Parisa: The parallels of accessibility and security
• Practice Quiz: SIEM Dashboards
• Explore common SIEM tools
• Reading: More about cybersecurity tools
• Talya: Myths about the cybersecurity field
• Practice Quiz: SIEM for Threats & Vulnerabilities
• Wrap-up
• Reading: Glossary terms from module 3
Use playbooks to respond to incidents
• Welcome to module 4
• Phases of an incident response playbook
• Reading: More about playbooks
• Zack: Incident response and the value of playbooks
• Practice Quiz: Test your knowledge: Incident response
• Apply a playbook for threats, vulnerabilities and risks.
• Erin: The value of diverse perspectives in security teams
• Reading: Playbooks, SIEM tools, and SOAR tools
• Practice Quiz: Use a playbook to respond to an incident
• Wrap-up
• Reading: Glossary terms from module 4
• Course wrap-up
• Reading: Course 2 glossary
• Discussion Prompt: Your Course 2 learning journey
• Reading: Get started on the next course
Semester 3: Connect and Protect: Networks and Network Security
https://static.wixstatic.com/media/9638ce_dd0b288bf166487faeb144e102fef4fb~mv2.png
About this Course
This is the third course in the Univad Diploma in Cybersecurity. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Univad Diploma in Cybersecurity. In this course, you will explore how networks connect multiple devices and allow them to communicate.
You'll start with the fundamentals of modern networking operations and protocols. For example, you'll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. Then, you'll learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, you'll be able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
What you'll learn
—Define the types of networks and components of networks
—Illustrate how data is sent and received over a network
—Understand how to secure a network against intrusion tactics
—Describe system hardening techniques Skills you'll gain
—Security Hardening
—Network Security
—Transmission Control Protocol / Internet Protocol (TCP/IP)
—Network Architecture
—Cloud Networks This course is part of multiple programs.
Course Syllabus
Network Architecture
• Introduction to Course 3
• Reading: Course 3 overview
• Reading: Helpful resources and tips
• Discussion Prompt: Connect with your classmates
• Welcome to module 1
• Chris: My path to cybersecurity
• What are networks?
• Tina: Working in network security
• Emmanuel: Useful skills for network security
• Network tools
• Reading: Network components, devices, and diagrams
• Cloud networks
• Reading: Cloud computing and software-defined networks
• Practice Quiz: Test your knowledge: Introduction to network
• Introduction to network communication
• The TCP/IP model
• The four layers of the TCP/IP model
• Reading: Learn more about the TCP/IP model
• Reading: The OSI model
• Practice Quiz: Test your knowledge: Network communication
• IP addresses and network communication
• Reading: Components of network layer communication
• Practice Quiz: Local and wide network communication
• Wrap-up
• Reading: Glossary terms from module 1
• Practice Quiz: Test your knowledge: System identification
• Practice Quiz: Network interception attack tactics
Network operations
• Welcome to module 2
• Network protocols
• Reading: Common network protocols
• Reading: Additional network protocols
• Antara: Working in network security
• Wireless protocols
• Reading: The evolution of wireless security protocols
• Practice Quiz: Recognize different network protocols
• Firewalls and network security measures
• Virtual private networks (VPNs)
• Security zones
• Reading: Subnetting and CIDR
• Proxy servers
• Virtual networks and privacy
• Reading: VPN protocols: Wireguard and IPSec
• Wrap-up
• Reading: Glossary terms from module 2
Secure against network intrusions
• Welcome to module 3
• The case for securing networks
• Practice Quiz: How intrusions compromise your system
• Matt: A professional on dealing with attacks
• Denial of Service (DoS) attacks
• Reading: Read tcpdump logs
• Reading: Real-life DDoS attack
• Practice Quiz: Protect networks from DoS attacks
• Malicious packet sniffing
• IP Spoofing
• Wrap-up
Security Hardening
• Welcome to module 4
• Security hardening
• OS hardening practices
• Reading: Brute force attacks and OS hardening
• Reading: Test your knowledge: OS hardening
• Practice Quiz: Test your knowledge: OS hardening
• Network hardening practices
• Reading: Network security applications
• Practice Quiz: Test your knowledge: Network hardening
• Network security in the cloud
• Kelsey: Cloud security explained
• Reading: Secure the cloud
• Cryptography and cloud security
• Practice Quiz: Test your knowledge: Cloud hardening
• Wrap-up
• Reading: Glossary terms from module 4
• Course wrap-up
• Reading: Course 3 glossary
• Discussion Prompt: Your Course 3 learning journey
• Reading: Get started on the next course
Semester 4: Tools of the Trade: Linux and SQL
https://static.wixstatic.com/media/9638ce_e9e82113b41a4d8ea5f73b3ba2ab2690~mv2.png
About this Course
This is the fourth course in the Univad Diploma in Cybersecurity. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the third Univad Diploma in Cybersecurity.
In this course, you will explore computing skills that you’ll use on-the-job as a cybersecurity analyst. First, you'll practice using Linux, an operating system commonly used by cybersecurity professionals. For example, you'll use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, you'll use SQL to communicate with a database. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
What you'll learn
—Explain the relationship between operating systems, applications, and hardware
—Compare a graphical user interface to a command line interface
—Navigate and manage the file system using Linux commands via the Bash shell
—Use SQL to retrieve information from a database Skills you'll gain
—Command line interface (CLI)
—SQL
—Linux
—Bash This course is part of multiple programs.
Course Syllabus
Introduction to operating systems
• Introduction to Course 4
• Reading: Course 4 overview
• Reading: Helpful resources and tips
• Discussion Prompt: Connect with your classmates
• Welcome to module 1
• Kim: My journey into computing
• Introduction to operating systems
• Reading: Compare operating systems
• Discussion Prompt: Your background in operating systems
• Practice Quiz: Operating Systems: Test Your Skills
• Inside the operating system
• Reading: Requests to the operating system
• Resource allocation via the OS
• Reading: Virtualization technology
• Practice Quiz: OS at work: Test your knowledge
• GUI versus CLI
• Reading: The command line in use
• Practice Quiz: Activity: Select the user interface
• Ellen: My path into cybersecurity
• Practice Quiz: Test your knowledge: The user interface
• Wrap-up
• Reading: Glossary terms from module 1
• Practice Quiz: Test your knowledge: SQL and databases
The Linux operating system
• Welcome to module 2
• Introduction to Linux
• Phil: Learn and grow in the cybersecurity field
• Linux architecture
• Reading: Linux architecture explained
• Practice Quiz: Test your knowledge: All about Linux
• Linux distributions
• KALI LINUX ™
• Reading: More Linux distributions
• Reading: Package managers for installing applications
• Reading: Lab tips and troubleshooting steps
• Practice Quiz: Test your knowledge: Linux distributions
• Introduction to the shell
• Reading: Different types of shells
• Input and output in the shell
• Practice Quiz: Test your knowledge: The shell
• Discussion Prompt: Strategies to learn new skills
• Wrap-up
• Reading: Glossary terms from module 2
Linux commands in the Bash shell
• Welcome to module 3
• Linux commands via the Bash shell
• Core commands for navigation and reading files
• Reading: Navigate Linux and read file content
• Practice Quiz: Navigate the Linux file system in Bash
• Find what you need with Linux
• Reading: Filter content in Linux
• Create and modify directories and files
• Reading: Manage directories and files
• Practice Quiz: Manage file content in Bash
• File permissions and ownership
• Change permissions
• Reading: Permission commands
• Add and delete users
• Reading: Responsible use of sudo
• Damar: My journey into Linux commands
• The Linux community
• Man pages within the shell
• Reading: Linux resources
• Discussion Prompt: Linux Commands for Cybersecurity Pros
• Practice Quiz: Test your knowledge: Get help in Linux
• Wrap-up
• Reading: Reference guide: Linux
• Reading: Glossary terms from module 3
Databases and SQL
• Welcome to module 4
• Introduction to databases
• Query databases with SQL
• Reading: SQL filtering versus Linux filtering
• Adedayo: SQL in cybersecurity
• Basic queries
• Basic filters on SQL queries
• Filter dates and numbers
• Filters with AND, OR, and NOT
• Join tables in SQL
• Types of joins
• Reading: Compare types of joins
• Wrap-up
• Reading: Reference guide: SQL
• Reading: Glossary terms from module 4
• Course wrap-up
• Reading: Course 4 glossary
• Reading: Your Course 4 learning journey
• Reading: Get started on the next course
Semester 5: Asset and Threat Management
https://static.wixstatic.com/media/9638ce_6028296ac5ce4dfe8d50f1028c5487a3~mv2.png
Semester 6: Cybersecurity: Threat Detection and Response
https://static.wixstatic.com/media/9638ce_460ee0a9acb9457c9875fed2d680d8ae~mv2.png