The Basics Of Information Security: Understandi...
This course gives you the background needed to understand the basics of Cybersecurity. You will explore information security from its history to a description of various cybercriminals and cybersecurity threats concluding with the tools needed to prevent an attack.
The Basics of Information Security: Understandi...
A business owner may not need to delve into the complexities of being able to handle all aspects of information technology as this can frequently be outsourced to a professional firm much more efficiently, but all business owners can benefit from knowing some basics. Computers are constantly evolving, but understanding some of the basic specifications in each category of products can help a business owner identify the most appropriate deal on the right equipment for their business.
The right information technology firm can help to identify gaps and problems in an existing system or to begin to put together an information technology system from the ground up. In either situation, a business owner can benefit from the outside knowledge provided by an information technology professional. While the basics of information technology may be easily grasped by a business owner or even high level employees within the firm, having an information technology professional easily accessible can help to address larger problems and allow for better capabilities across the board.
Alignment to the NIST SP 800-181 Cybersecurity Workforce FrameworkCategorySpecialty AreaWork RolesProtect and DefendCyber Defense AnalysisCyber Defense AnalystProtect and DefendCyber Defense Infrastructure SupportCyber Defense Infrastructure Support SpecialistProtect and DefendIncident ResponseCyber Defense Incident ResponderProtect and DefendVulnerability Assessment and ManagementVulnerability Assessment Analyst+ Course Modules/Units Session 1Session 2Session 3Session 4 5 Hours Coding 101Skill Level: Beginner + Description This course focuses on the basics of computer programming and how to give a machine a set of instructions to produce a desired behavior. This course also provides information on the elements of programming and programming languages, frameworks, and models. The course includes an interactive programming game, interactive knowledge checks, and the chance to write a fully functional code.
Learning Objectives:Explain the benefits and challenges of reverse engineering.
Perform basic tasks with reverse engineering tools.
Understand basics of Intel x86 assembly code.
Describe the Microsoft Windows executable file format and understand the basics of the Windows API.
Extract actionable information from ta malicious binary file that can be used in analysis reports.
Date: 2016 041b061a72