Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Essentials
Resources
Cybersecurity Essentials Program Overview
Welcome Video (2:20)
Domain 1: General Security Concepts
1.1 Types of Security Controls Study Guide
Types of Security Controls Video (6:04)
Types of Security Controls Knowledge Check
Types of Security Controls Knowledge Check Answers and Explanations
1.2 Fundamental Security Concepts Study Guide
Fundamental Security Concepts Video (36:49)
Fundamental Security Concepts Knowledge Check
Fundamental Security Concepts Quiz Answers and Explanations
1.3 Change Management Processes Study Guide
Change Management Processes Video (12:35)
Change Management Processes Knowledge Check
Change Management Processes Knowledge Check Answers and Explanations
1.4 Cryptographic Solutions Study Guide
Cryptographic Solutions Video (32:33)
Cryptographic Solutions Knowledge Check
Cryptographic Solutions Knowledge Check Answers and Explanations
Domain One Review Video (5:09)
Domain One Review Guide
Domain One Quiz
Domain One Quiz Answers and Explanations
Domain 2: Threats, Vulnerabilities, and Mitigations
2.1 Common Threat Actors and Motivations Study Guide
Common Threat Actors and Motivations Video (12:11)
Common Threat Actors and Motivations Knowledge Check
Common Threat Actors and Motivations Knowledge Check Answers and Explanations
2.2 Common Threat Vectors and Attack Surfaces Study Guide
Common Threat Vectors and Attack Surfaces Video (16:03)
Common Threat Vectors and Attack Surfaces Knowledge Check
Common Threat Actors and Motivations Study Guide Knowledge Check Answers and Explanations
2.3 Various Types of Vulnerabilities Study Guide
Various Types of Vulnerabilities Video (13:02)
Various Types of Vulnerabilities Knowledge Check
Various Types of Vulnerabilities Knowledge Check Answers and Explanations
2.4 Indicators of Malicious Activity Study Guide
Indicators of Malicious Activity Video (22:12)
Indicators of Malicious Activity Knowledge Check
Indicators of Malicious Activity Knowledge Check Answers and Explanations
2.5 Mitigation Techniques to Secure the Enterprise Study Guide
Mitigation Techniques to Secure the Enterprise Video (8:45)
Mitigation Techniques to Secure the Enterprise Knowledge Check
Mitigation Techniques to Secure the Enterprise Knowledge Check Answers and Explanations
Domain Two Review Guide
Domain Two Review Video (3:41)
Domain Two Quiz
Domain Two Quiz Answers and Explanations
Domain 3: Security Architecture
3.1 Security Implications of Different Architecture Models Study Guide
Security Implications of Different Architecture Models Video (14:00)
Security Implications of Different Architecture Models Knowledge Check
Security Implications of Different Architecture Models Knowledge Check Answers and Explanations
3.2 Security Principles to Secure Enterprise Infrastructure Study Guide
Security Principles to Secure Enterprise Infrastructure Video (13:48)
Security Principles to Secure Enterprise Infrastructure Knowledge Check
Security Principles to Secure Enterprise Infrastructure Knowledge Check Answers and Explanations
3.3 Concepts and Strategies to Protect Data Study Guide
Concepts and Strategies to Protect Data Video (8:52)
Concepts and Strategies to Protect Data Knowledge Check
Concepts and Strategies to Protect Data Knowledge Check Answers and Explanations
3.4 Resilience and Recovery in Security Architecture Study Guide
Resilience and Recovery in Security Architecture Video (15:03)
Resilience and Recovery in Security Architecture Knowledge Check
Resilience and Recovery in Security Architecture Knowledge Check Answers and Explanations
Domain Three Review Guide
Domain Three Review Video (3:30)
Domain Three Quiz
Domain Three Quiz Answers and Explanations
Domain 4: Security Operations
4.1 Common Security Techniques to Computing Resources Study Guide
Common Security Techniques to Computing Resources Video (13:03)
Common Security Techniques to Computing Resources Knowledge Check
Common Security Techniques to Computing Resources Knowledge Check Answers and Explanations
4.2 Security Implications of Proper Hardware, Software, and Data Asset Management Study Guide
Security Implications of Proper Hardware, Software, and Data Asset Management Video (6:07)
Security Implications of Proper Hardware, Software, and Data Asset Management Knowledge Check
Security Implications of Proper Hardware, Software, and Data Asset Management Knowledge Check Answers and Explanations
4.3 Vulnerability Management Activities Study Guide
Vulnerability Management Activities Video (18:04)
Vulnerability Management Activities Knowledge Check
Vulnerability Management Activities Knowledge Check Answers and Explanations
4.4 Security Alerting and Monitoring Concepts and Tools Study Guide
Security Alerting and Monitoring Concepts and Tools Video (9:43)
Security Alerting and Monitoring Concepts and Tools Knowledge Check
Security Alerting and Monitoring Concepts and Tools Knowledge Check Answers and Explanations
4.5 Enterprise Capabilities to Enhance Security Study Guide
Enterprise Capabilities to Enhance Security Video (15:58)
Enterprise Capabilities to Enhance Security Knowledge Check
Enterprise Capabilities to Enhance Security Knowledge Check Answers and Explanations
4.6 Identity and Access Management Study Guide
Identity and Access Management Video (14:01)
Identity and Access Management Knowledge Check
Identity and Access Management Knowledge Check Answers and Explanations
4.7 Automation and Orchestration Related to Secure Operations Study Guide
Automation and Orchestration Related to Secure Operations Video (8:51)
Automation and Orchestration Related to Secure Operations Knowledge Check
Automation and Orchestration Related to Secure Operations Knowledge Check Answers and Explanations
4.8 Appropriate Incident Response Activities Study Guide
Appropriate Incident Response Activities Video (8:17)
Appropriate Incident Response Activities Knowledge Check
Appropriate Incident Response Activities Knowledge Check Answers and Explanations
4.9 Data Sources to Support an Investigation Study Guide
Data Sources to Support an Investigation Video (6:15)
Data Sources to Support an Investigation Knowledge Check
Data Sources to Support an Investigations Knowledge Check Answers and Explanations
Domain Four Review Guide
Domain Four Review Video (3:27)
Domain Four Quiz
Domain Four Quiz Answers and Explanations
Domain 5: Security Program Management and Oversight
5.1 Elements of Effective Security Governance Study Guide
Elements of Effective Security Governance Video (21:16)
Elements of Effective Security Governance Knowledge Check
Elements of Effective Security Governance Knowledge Check Answers and Explanations
5.2 Elements of the Risk Management Process Study Guide
Elements of the Risk Management Process Video (17:26)
Elements of the Risk Management Process Knowledge Check
Elements of the Risk Management Process Knowledge Check Answers and Explanations
5.3 Third-party Risk Assessment and Management Study Guide
Third-party Risk Assessment and Management Video (8:50)
Third-party Risk Assessment and Management Knowledge Check
Third-party Risk Assessment and Management Knowledge Check Answers and Explanations
5.4 Elements of Effective Security Compliance Study Guide
Elements of Effective Security Compliance Video (9:42)
Elements of Effective Security Compliance Knowledge Check
Elements of Effective Security Compliance Knowledge Check Answers and Explanations
5.5 Types and Purposes of Audits and Assessments Study Guide
Types and Purposes of Audits and Assessments Video (9:17)
Types and Purposes of Audits and Assessments Knowledge Check
Types and Purposes of Audits and Assessments Knowledge Check Answers and Explanations
5.6 Implement Security Awareness Practices Study Guide
Implement Security Awareness Practices Video (8:10)
Implement Security Awareness Practices Knowledge Check
Implement Security Awareness Practices Knowledge Check Answers and Explanations
Domain Five Review Guide
Domain Five Review Video (3:37)
Domain Five Quiz
Domain Five Quiz Answers and Explanations
Final Exam
Final Exam
Final Exam Answers and Explanations
Additional Resources
Cybersecurity Essentials Complete Study Guide
Glossary of Terms and Acronyms
CompTIA Secuirty+ Exam Objectives
How to Redeem Your Lab Access Video (4:54)
Cyber Brain Academy Course Catalog
Implement Security Awareness Practices Video
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock