Cybersecurity Foundations: Threats Networks, and IoT Protection

This course is part of Information Assurance Analysis Specialization

Instructor: Jason Crossland

What you'll learn

  •   Understand the relationship between malware, vulnerabilities, and exploits, and identify major types of malware using catalogs and signatures.
  •   Learn how to collect and analyze network traffic with NetFlow and tools like SiLK or Wireshark to detect and interpret potential threats.
  •   Explore internet addressing fundamentals, including IPv4 and IPv6, and utilize tools like WHOIS and BGP routing for host and network lookups.
  •   Gain practical experience in securing IoT environments by building frameworks, understanding privacy risks, and implementing security measures.
  • Skills you'll gain

  •   Network Monitoring
  •   Cybersecurity
  •   TCP/IP
  •   Cyber Risk
  •   Threat Detection
  •   Network Routing
  •   Network Analysis
  •   Network Security
  •   Vulnerability Assessments
  •   Network Protocols
  •   Malware Protection
  •   Border Gateway Protocol
  •   Internet Of Things
  •   Docker (Software)
  • There are 5 modules in this course

    This course stands out by combining practical exercises with foundational knowledge, ensuring you’re ready to apply what you learn to real-world situations. Whether you’re a beginner or expanding your cybersecurity expertise, completing this course will enhance your ability to protect networks, manage internet space, and secure IoT devices—skills in high demand across the IT sector.

    Malware, Vulnerabilities, Exploitation and AV

    NetFlow and The SiLK Toolkit

    Addressing, BGP and Lookup

    Internet of Things (IoT)

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved