Information Technology
Star icon
Most Popular
Trending Arrow Icon
Trending
Hands on Training icon
Hands On Training
Star icon
Trending Arrow Icon
Hands on Training icon

Intro to Cybersecurity

Course Cover
compare button icon
Course Report - Intro to Cybersecurity

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

4 months

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Effort

10 hours per week

icon

Teaching Type

Self Paced

Course Description

Cybersecurity is an important area for all businesses, particularly given the increase in data breaches. In the first half 2020 alone, more than 3.2million records were compromised in data breaches. Businesses are desperate to fill cybersecurity positions to reduce risk and increase security. However, there will be 3.5 million cybersecurity jobs unfilled by 2021. This program provides the foundational skills you need to start in this highly-demanded field.

The Introduction to Cybersecurity Nanodegree program is your first step towards a career as a cybersecurity professional. This program teaches you how to monitor, manage, and evaluate the security of computer systems. Learn how to respond to threats and create security controls to reduce risk while meeting security compliance goals.

Course Overview

projects-img

Job Assistance

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

Prerequisites/Requirements

Principles of network connectivity

Basic operating system fundamentals including Windows or Linux

What You Will Learn

Evaluate specific security techniques used to administer a system that meets industry standards and core controls

Explain methods for establishing and maintaining the security of a network, computing environment, and application

Apply control techniques to secure networks, operating systems, and applications

Conduct threat assessments and vulnerability scans to secure the assets of an organization

Target Students

Security Analyst

Ethical Hacking Analyst

Cybersecurity Analyst

Course Instructors

Author Image

Ron Woerner, CISSP, CISM

Chief Security Officer

Ron Woerner is a noted consultant, speaker and writer in the security industry. As Chief Security Evangelist at Cyber-AAA, LLC, he delivers training and security risk assessments for small, medium, a...
Author Image

Jerry Smith

Information Security Engineer

Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.
Author Image

Christine Izuakor, PhD, CISSP

Founder & Ceo, Cyber Pop-Up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within F...
Author Image

Sean Pike, Esq., M.S.

Sr. Director, Security & Grc

Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive secur...
Course Cover