Path icon Learning Paths
Skills

Information and Cyber Security Foundations

  • Number of Courses11 courses
  • Duration3 hours

Welcome to the introductory skill path for hands-on technical skills in cyber security.

In this skill path, you will cover the basics of Windows and Linux, networking, and applications that are often defined as “implied” knowledge for security professionals. Most of these skills focus on defense, but offensive use of similar capabilities are also covered. This duality of perspective provides a well-rounded understanding of the problem sets covered in more advanced professional roles. The use of native operating system functions, basic network protocols, and common application mechanics is critical for all roles within cyber security. This path is the gateway from conceptual understanding to the technical application of cyber security skills within specific job roles. The skills learned in this path are heavily focused on hands-on learning, allowing you to gain experience and experiment in a safe environment.

Courses in this path

Introduction

This introduction is the first step that covers the essential skills and knowledge for a successful career in the cyber security field.

Linux Endpoint Security Foundations

In this section, you are introduced to Linux tools and commands used to access different operating system components. Understanding how to use existing tools on endpoint systems to detect or emulate threat actor activity is instrumental to your knowledge of more advanced security operations capabilities. You are shown what "normal" looks like for each OS component, then guided through identifying anomalous activity in a live environment.

Windows Endpoint Security Foundations

In this section, you are introduced to Windows tools and commands used to access different operating system components. Understanding how to use existing tools on endpoint systems to detect or emulate threat actor activity is instrumental to your knowledge of more advanced security operations capabilities. You are shown what "normal" looks like for each OS component, then guided through identifying anomalous activity in a live environment.

Network Protocols for Security Foundations

In this section, you will find introductions to some common network protocols, and why this knowledge is useful for security professionals. These are the protocols that enable the internet and allow for all the connections between machines and people. Understanding how they work, and sometimes more importantly, how they don't work, is instrumental to your knowledge of more advanced security operations capabilities. Enjoy!

Join our learners and upskill
in leading technologies