Explore a Career in Cybersecurity

Details

This course explores a career in cybersecurity and reviews various topics, including cybersecurity roles, job requirements, problem-solving techniques, and cybersecurity concepts. This course will help you decide whether a career in cybersecurity is something that aligns with your talents and interests and, if so, the best next steps to pursue this lucrative career path.

Enrollment Options:

Instructor-Led
6 Weeks Access Course Code: cyb
Start Dates* Sep 18 | Oct 16 | Nov 13 | Dec 18
*Choose start date in cart

$129.00

USD

Enroll before 31th May and get high quality lamination on your hardcopy certificate absolutely free! Use your certificate to your advantage by showing your certified credentials to prospective employers and recruiters.

Syllabus

Introduction to Cybersecurity

In Lesson 1, we will introduce you to the course and give you an overview of cybersecurity and its major components. We will dive into the history and evolution of cybersecurity so you can see how it has grown throughout the years to become a significant business and technology concern. Finally, as you consider a career in cybersecurity, it is essential to understand what education and experience you will need, so we will take a look at those and other requirements, too.

Cybersecurity Roles and Industries

In Lesson 2, we will learn about the various roles in cybersecurity that you may take on in an organization. We will examine the industries where cybersecurity is particularly important as well as why it is so important. We will get the scoop on the types of roles and industries you may want to pursue when you enter cybersecurity.

Problem Solving

Although you may think of cybersecurity as a purely technical field, cybersecurity professionals also need essential soft skills. We will dive into the important communication skills required when dealing with clients, employees, management, and outside groups. In your cybersecurity career, you will most likely be working on teams, so we will look at teams in the workplace and how important team skills are. We will learn the characteristics of a problem solver. Lastly, you will explore the troubleshooting process and why it is important to follow the steps to identify a problem and correct it now and prevent it in the future.

Cybersecurity Basics

This lesson will look at the different kinds of cybersecurity risks companies face. You will explore the tools and the data used to discover, identify, and mitigate attack threats. We will take a look at cybersecurity laws and regulations, why they exist, and how they impact cybersecurity.

Types of Information Security

Hackers and other bad actors can attack various levels of public and private computing. In this lesson, we dive into types of information security that affect all of us, from critical infrastructure vital to the operation of the country to corporate networks, the cloud, and even appliances in our homes through the Internet of Things. We will define critical infrastructure security and explore its parts. We will look at how security works in different areas to help secure our infrastructure. Next, we will examine other ways to protect the things that make our lives easier—and that people often do not realize need protecting.

Common Concepts and Terminology

In this lesson, we will explore the common concepts in cybersecurity and the specialized terminology its professionals use. We will dive into cryptography by defining and showing examples and how it is used. Next, we will explore why obfuscation is important in cybersecurity and the differences between threats and vulnerabilities. Smart businesses have a plan for when attacks happen, so we will look at Incident Response Plans, how they are created, and what they should contain. Finally, we will examine Identity and Access Management (IAM) and the IAM framework—authentication, authorization, and accounting.

Types of Threats

This lesson will teach you about the types of threats companies face as they do their day-to-day work. After learning about the types of threats, we will examine how they happen and, most importantly, how they can be avoided. Not every threat is malicious; sometimes unwitting employees inadvertently give away information or an unsuspecting person bites on a phishing attempt. We will explore social engineering by defining it, giving examples, and learning about the four steps of the social engineering process.

Secure Coding

While you don't need to be a programmer to be a cybersecurity professional, coding is important in protecting software from hackers. In Lesson 8, we will deliver the goods on secure coding. We will learn why it is crucial and see the qualities of secure coding. Next, we will look at frameworks created to give developers a process for implementing secure coding in both new and older applications. Finally, we will take a look at secure coding framework examples.

Protecting the Business

In this lesson, we will learn about cybersecurity from the perspective of the company or organization. We will explore how companies respond to attacks, and know how companies try to ensure their organization will recover from an attack after surviving and dealing with it. Then, we will revisit the various types of data important to businesses and how companies can protect that data. This is where cybersecurity specialists really shine!

Developing a Security Awareness Program

In this lesson, we will explore cybersecurity in business. You will learn about security awareness and how to bring it to employees of a company, including how to develop a good Security Awareness Program (SAP). We will explore how to create a good security culture as well as a cybersecurity culture. These cultures are essential because when security is relevant to everyone in the company, they will participate in the process of cybersecurity for the company.

Employment and the Future of Cybersecurity

In Lesson 11, we will look at employment prospects and the future expectations for cybersecurity employment. We will explore some strategies to identify positions in the cybersecurity field that are best suited for a new cybersecurity employee. Since cybersecurity is a large profession with many different positions, it is important to home in on attributes important to you in a job and learn how to find the job best suited to you. Next, we will explore remote work and how it relates to a cybersecurity specialist. You will examine the benefits and challenges of working remotely for both an employee and the business. Finally, we will dive into the projected growth of cybersecurity and specific sub-areas where the most significant job growth is expected to occur.

Next Steps

As we wrap up the course, we will look at the best education paths, various cybersecurity certifications, and degrees that are in demand for different cybersecurity specialties. You will learn about the importance of and the types of continuing education. Finally, you will explore how to catch a company's attention with specific and highly developed resumes and cover letters to help you land a job.

Requirements

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or newer.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.

Other:

  • Email capabilities and access to a personal email account.

Prerequisites

There are no prerequisites to take this course.

Instructor

Sara Perrott

Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author, a former college professor, and is passionate about teaching the next generation of cybersecurity professionals. Sara has an MS in Cybersecurity and Information Assurance from WGU Washington and a BS in Information Systems Security from the University of Phoenix.

Reviews

About ExpertRating

ExpertRating is an ISO 9001:2015 certified company offering online certification and training services to individuals and companies globally. Over 25 million people have benefited from ExpertRating Online Certifications and assessments. ExpertRating is the winner of the Google SME Hero's award for showing outstanding use of technology in delivering trusted services to thousands of people on a daily basis. Our affordable certifications are an excellent way of demonstrating your knowledge and skills to prospective employers as well as vastly boosting your chances of moving ahead in your business or career.

Company Timeline

Since 2001

Decades of excellence

800+ Skill Tests

World’s largest test inventory

2500+ Companies

Thousands depend on use

25 Million People Tested

10 tests every minute

35 Countries Serviced

Over 1500 clients in the US

86% Reorder Rate

Satisfied clients

We deliver over 3 million online certification tests and online courses annually.

Awards

ExpertRating is a winner of the Google SME Heroes award. This award has been instituted by Google to honor IT companies that have excelled in their domain and have leveraged the internet to grow and expand their businesses in innovative ways.


ExpertRating is an ISO 9001:2015 certified company, which reflects that our courses and tests conform to the highest international quality standards. Our training material is prepared by thorough professionals with years of experience, and goes through several rounds of analysis by expert teams to help develop well-balanced, comprehensive and meaningful content.