Career & Technical Education (CTE) Program

Operational Cybersecurity 1b: Security and Planning in the Workplace

Operational Cybersecurity 1b: Security and Planning in the Workplace

More and more, companies are under attack by malicious cyber attackers compromising the security of sensitive employee, customer, and societal data. In this course, you will dive into data security in the workplace and will learn ways to mitigate cyber threats that lurk in dark corners. You will step into the familiar shoes of CISO, this time at a startup company, making decisions about access and authentication protocols, security planning, and expanding the business in a safe way. Lastly, you will explore real-world security breaches, how they were solved, and step-by-step instructions to setup robust security policies. Let’s continue forging your cybersecurity stronghold against cyber attackers and keep sensitive data secure.

Review course outline

Access for a year

USD 299.00*

* Choose more courses to get a discount

Enroll now

Units at a glance

What will you learn in this unit?

  • Explain the components that allow a user to be authorized on a network
  • Understand access control models and their uses
  • Recommend policies to protect against third-party vulnerabilities
  • Discuss the 2019 Capital One data breach

What will you learn in this unit?

  • Explain authentication factors
  • Understand how biometrics are used as authentication factors
  • Identify protocols used in network-level authentication
  • Consider the use of single sign-on (SSO) and the implementation of authentication on switches and routers
  • Think about a perfect protocol scenario

What will you learn in this unit?

  • Explain the need for continuous monitoring
  • Understand the basics of digital forensics
  • Describe the vulnerability scan process
  • Consider the penetration testing process
  • Plan possible post-scan actions

What will you learn in this unit?

  • Identify the difference between incident response and disaster recovery plans
  • Understand the NIST 800-61 incident response framework
  • Identify the steps in the Cyber Kill Chain®, MITRE ATT&CK, and Diamond model frameworks
  • Respond to a mock security incident
  • Conduct a post-incident analysis

What will you learn in this unit?

  • Identify security awareness training frameworks
  • Explain various data classification categories
  • List examples of good workplace security habits
  • Consider positive security habits for Sys Admins
  • Understand hands-on learning opportunities in cybersecurity

What will you learn in this unit?

  • Identify different types of computer crimes and their consequences
  • Explain different types of copyright issues in the digital era
  • Understand how to handle data ethically
  • Consider data laws that are in place in the United States
  • Describe best practices concerning ethical behavior on networks and in personal digital activities

What will you learn in this unit?

  • Define different device ownership models
  • Identify various security concerns related to employees bringing personal devices to work
  • Explain the purpose of mobile device management (MDM) platforms
  • List various MDM polices that can be enforced
  • Understand how Cisco Systems selected a new MDM

What will you learn in this unit?

  • Define the cloud and discuss why an organization may use these types of platforms
  • Identify different cloud platform security controls
  • Consider cloud application security controls
  • Understand cloud security misconfigurations

Physical

  • Audio recording device
     

Software

  • Word processing software
  • Spreadsheet software
  • Proprietary or open-source tool to test for technical vulnerabilities
     

Optional

  • Image editing software
  • Presentation software
  • Video recording device
Enroll now
Go back

Companion courses

National Security

National Security

Show all
Principles of Information Technology 1a: Introduction

Principles of Information Technology 1a: Introduction

Show all
Principles of Information Technology 1b: Working with Computers

Principles of Information Technology 1b: Working with Computers

Show all
Cybersecurity 1a: Foundations

Cybersecurity 1a: Foundations

Show all
Cybersecurity 1b: Defense Against Threats

Cybersecurity 1b: Defense Against Threats

Show all
Network Security Fundamentals 1b: Forensics and Permissions

Network Security Fundamentals 1b: Forensics and Permissions

Show all
Operational Cybersecurity 1a: Introduction

Operational Cybersecurity 1a: Introduction

Show all