Module 1: Introduction to CyberSecurity
1.1. Thế giới của CyberSecurity
1.1.1 What Is Cybersecurity?
1.1.2 Protecting Your Personal Data
1.1.3 Your Online Identity
1.1.4 Your Data
1.1.5 Where Is Your Data?
1.1.6 What's More...
1.1.7 Smart Devices
1.1.8 What Do Hackers Want?
1.1.9 Identity Theft
1.1.10 Who Else Wants My Data?
1.2. Dữ liệu của tổ chức (Organization of Data)
1.2.1 Types of Organizational Data
1.2.2 The Cube
1.2.3 What Do You Think?
1.2.4 Is This for Real?
1.2.5 Data Security Breaches
1.2.6 Consequences of a Security Breach
1.3. What was taken?
1.3.1 Scenario 1
1.3.2 What Happened?
1.3.3 Scenario 2
1.3.4 What Exploits?
1.3.5 Rewind...
1.3.6 Key Takeaways
1.3.7 Find out More
1.4. Cyber Attacker
1.4.1 Types of Attackers
1.4.2 What Color Is My Hat?
1.4.3 Internal and External Threats
1.4.4 What Do You Think?
1.5. CyberWarfare
1.5.1 Sign of the Times (Stuxnet)
1.5.2 The Purpose of Cyberwarfare
Module 2: Attack, Concepts and Techniques
2.1. Analyzing a CyberAttack
2.1.1 Types of Malware
2.1.2 Symptoms of Malware
2.1.3 What Do You Think?
2.2. Method of Infiltration
2.2.1 Social Engineering
2.2.2 Denial-of-Service
2.2.3 Distributed DoS
2.2.4 Botnet
2.2.5 On-Path Attacks
2.2.6 SEO Poisoning
2.2.7 Wi-Fi Password Cracking
2.2.8 Password Attacks
2.2.9 Cracking Times
2.2.10 Advanced Persistent Threats
2.2.11 It’s Over to You...
2.3.Security Vulnerable and Expoit
2.3.1 Hardware Vulnerabilities
2.3.2 Software Vulnerabilities
2.3.3 Categorizing Software Vulnerabilities
2.3.4 Software Updates
2.3.5 What Do You Think?
2.4. The CyberSecurity Landscape
2.4.1 Cryptocurrency
2.4.2 Cryptojacking
Module 3: Protecting your Data and Privacy
3.1. Protecting your Device and Network
3.1.1 What Do You Think?
3.1.2 Protecting Your Computing Devices
3.1.3 Wireless Network Security at Home
3.1.4 Public Wi-Fi Risks
3.1.5 Password Security
3.1.6 A Strong Password
3.1.7 Using a Passphrase
3.1.8 Password Guidelines
3.1.9 Password Check
3.2. Data Maintenance
3.2.1 What Is Encryption?
3.2.2 How Do You Encrypt Your Data?
3.2.3 Back Up Your Data
3.2.4 Are They Really Gone?
3.2.5 How Do You Delete Your Data Permanently?
3.3. Who owns your data?
3.3.1 Terms of Service
3.3.2 Understand the Terms
3.3.3 What Are You Agreeing To?
3.3.4 The Data Use Policy
3.3.5 Privacy Settings
3.3.6 Before You Sign Up
3.3.7 Protect Your Data
3.4. Safeguard your Online privacy
3.4.1 Two Factor Authentication
3.4.2 Open Authorization
3.4.3 Social Sharing
3.4.4 Don't Get Spoofed
3.4.5 Email and Web Browser Privacy
3.5. Discover your online privacy
3.5.1 Scenario 1
3.5.2 Scenario 2
3.5.3 Scenario 3
3.5.4 Scenario 4
3.5.5 Scenario 5
3.5.6 Scenario 6
Module 4: Protecting the Organization
4.1. CyberSecurity Devices and Technology
4.1.1 Security Appliances
4.1.2 Which Is It?
4.1.3 Firewalls
4.1.4 Which One?
4.1.5 Port Scanning
4.1.6 What Does It Mean?
4.1.7 Intrusion Detection and Prevention Systems
4.1.8 Real-Time Detection
4.1.9 Protecting Against Malware
4.1.10 Security Best Practices
4.2. Behavior approach to CyberSecurity
4.2.1 Behavior-Based Security
4.2.2. NetFlow
4.2.3 Penetration Testing
4.2.4 Your Turn
4.2.5 Impact Reduction
4.2.6 What Is Risk Management?
4.3. Cisco Approach to CyberSecurity
4.3.1 Cisco's CSIRT
4.3.2 Security Playbook
4.3.3 Tools for Incident Detection and Prevention
4.3.4 Cisco’s ISE and TrustSec
4.3.5 Talk the Talk
Module 5: Will your future be in CyberSecurity?
5.1. Legal and Ethical Issue
5.1.1 Legal Issues in Cybersecurity
5.1.2 Ethical Issues in Cybersecurity
5.1.3 How did you answer?
5.1.4 Corporate Ethical Issues
5.2 Education and Career
5.2.1 Become a Cybersecurity Guru
5.2.2 Professional Certifications
5.2.3 Cybersecurity Career Pathways
Module 6: FINAL Lab, FINAL EXAM
1.1. Thế giới của CyberSecurity
1.1.1 What Is Cybersecurity?
1.1.2 Protecting Your Personal Data
1.1.3 Your Online Identity
1.1.4 Your Data
1.1.5 Where Is Your Data?
1.1.6 What's More...
1.1.7 Smart Devices
1.1.8 What Do Hackers Want?
1.1.9 Identity Theft
1.1.10 Who Else Wants My Data?
1.2. Dữ liệu của tổ chức (Organization of Data)
1.2.1 Types of Organizational Data
1.2.2 The Cube
1.2.3 What Do You Think?
1.2.4 Is This for Real?
1.2.5 Data Security Breaches
1.2.6 Consequences of a Security Breach
1.3. What was taken?
1.3.1 Scenario 1
1.4. Cyber Attacker
1.5. CyberWarfare
Module 2: Attack, Concepts and Techniques
2.1. Analyzing a CyberAttack
2.2. Method of Infiltration
2.3.Security Vulnerable and Expoit
2.4. The CyberSecurity Landscape
Module 3: Protecting your Data and Privacy
3.1. Protecting your Device and Network
3.2. Data Maintenance
3.3. Who owns your data?
3.3.1 Terms of Service
3.3.2 Understand the Terms
3.3.3 What Are You Agreeing To?
3.3.4 The Data Use Policy
3.3.5 Privacy Settings
3.3.6 Before You Sign Up
3.3.7 Protect Your Data
3.4. Safeguard your Online privacy
3.5. Discover your online privacy
Module 4: Protecting the Organization
4.1. CyberSecurity Devices and Technology
4.2. Behavior approach to CyberSecurity
4.3. Cisco Approach to CyberSecurity
Module 5: Will your future be in CyberSecurity?
5.1. Legal and Ethical Issue
5.2 Education and Career
5.2.1 Become a Cybersecurity Guru
5.2.2 Professional Certifications
5.2.3 Cybersecurity Career Pathways
Module 6: FINAL Lab, FINAL EXAM