New security threats emerge every day and end-users need to be armed with the right skills to make well-informed security decisions. In this journey, you will begin by becoming aware of common security threats, exposure to them, and their impact on businesses and assets. You will continue your discovery of what you need to do by learning how to identify, evaluate, and plan for security risks. Finally, you will learn how to adopt best practices and guidelines to mitigate security risks.
Suitable for individuals at all levels of professional experience, from entry-level to senior leadership.
Module Title | Module Brief |
Cybersecurity Fundamentals | Introduces core concepts like the CIA triad (Confidentiality, Integrity, Availability), authentication, and risk management essentials. |
Security Governance & Compliance | Covers governance frameworks, laws (e.g., GDPR, HIPAA), standards (ISO/IEC, NIST), and ethical codes for responsible cybersecurity practices. |
Incident Response & Lifecycle | Explores incident response phases—Preparation, Detection, Containment, and Recovery—plus team roles, forensics, and problem management. |
Access Control Models & Techniques | Details discretionary, role-based, mandatory, and attribute-based access controls, including Zero Trust architecture and policy enforcement points. |
Cryptography & Data Protection | Explains symmetric/asymmetric encryption, hashing, salting, and encryption methods for files, volumes, and databases to secure sensitive information. |
Cyber Hygiene & Threat Awareness | Focuses on phishing, password management, social engineering, malware prevention, and reporting protocols to reduce organizational risk exposure. |