Free

Entry-Level Cybersecurity Training

Are you new to cybersecurity and looking for a stepping stone into this exciting career field? Cybersecurity skills are in high demand, and the field is projected to grow 33% by 2030. This Entry-Level Cybersecurity Training course will give you the foundational knowledge you need to get started.
3
50
M
Time
beginner
difficulty
4
ceu/cpe

Course Content

Disaster Recovery

10m

Incident Response, Business Continuity, and Disaster Recovery
Business Continuity

10m

Incident Response, Business Continuity, and Disaster Recovery
Incident Response

10m

Incident Response, Business Continuity, and Disaster Recovery
Data Handling Practices

15m

Security Operations
Control Frameworks

10m

Security Controls and Control Frameworks
Access Management

15m

Security Controls and Control Frameworks
What is a Security Control?

15m

Security Controls and Control Frameworks
Network Security Infrastructure

15m

Computer Networking and Security
Network Threats and Attacks

15m

Computer Networking and Security
Common Ports and Protocols

15m

Computer Networking and Security
Network Models Part 2

15m

Computer Networking and Security
Networking and Network Models Part 1

15m

Computer Networking and Security
Network Terminology & The CIA Triad

10m

Computer Networking and Security
Welcome to this ELCT Course!

10m

Introduction to Entry-Level Cybersecurity Training
Course Conclusion

5m

Governance, Risk, and Compliance
Compliance

10m

Governance, Risk, and Compliance
Risk Management

10m

Governance, Risk, and Compliance
Governance

10m

Governance, Risk, and Compliance
Course Description

Are you new to cybersecurity and looking for a stepping stone into this exciting career field? Cybersecurity skills are in high demand, and the field is projected to grow 33% by 2030. This Entry-Level Cybersecurity Training course will give you the foundational knowledge you need to get started.

Who should take this course?

This course is for individuals who are interested in a cybersecurity career but do not have any prior knowledge or experience. It can also be useful for people working in sales who need to understand cybersecurity concepts in order to highlight how products and services support good cybersecurity. This course will give you the foundational knowledge you need to converse easily about cybersecurity and move to the next step in your cybersecurity career or goals.

What are the prerequisites for this course?

This is a beginner-level course, and it has no prerequisites.

Why take this course?

What makes this course so beneficial is that you will learn the terminology and key concepts needed to speak fluently about cybersecurity. You will also have a foundation upon which to build as you explore more advanced topics in the cybersecurity field. By the end of this course, you will be able to:

  • Explain security concepts related to information assurance (e.g., the CIA Triad)
  • Articulate the basic concepts of computer networking
  • Describe common network threats and attacks
  • Explain basic concepts related to network security infrastructure
  • Articulate the importance of data security and security controls
  • Explain access control concepts
  • Describe physical access controls
  • Describe logical access controls
  • Describe Incident Response (IR)
  • Define Business Continuity (BC)
  • Define Disaster Recovery (DR)
  • Define and explain the need for security awareness training
  • Describe the concepts of governance, risk management, and compliance
  • What makes this course different from others?

    This course attempts to demystify cybersecurity concepts in a way that makes them accessible to a total beginner. If you have no experience or previous training related to cybersecurity, you are the perfect person to take this course. All you need is a desire to learn. In addition, this course focuses on some key concepts that will come up again and again in your cybersecurity journey and those that appear on cybersecurity certifications that you may decide to pursue later. You will have a head start by taking this course and laying the foundation of your knowledge.

    Your instructor, Jennifer Barnabee, is a Course Manager at Cybrary, and she has worked with numerous cybersecurity professionals to put together courses on everything from cloud security to Adversary Emulation, Threat Hunting, and the exploitation and mitigation of high-impact vulnerabilities. She uses her background in technical writing and training to break down foundational concepts and provide them in a way that you can remember and relate to.

    This course is part of a Career Path:
    IT and Cybersecurity Foundations
    Get everything you need to start your cybersecurity career journey, and stop wasting your time (and money) sorting through unreliable information from questionable sources. While this industry offers very lucrative career opportunities, finding accurate, relevant information to break into the field can be incredibly frustrating. That’s why we’ve crafted this IT and Cybersecurity Foundations path, featuring thoughtful, bite-sized content from expert instructors covering core concepts found across all cybersecurity roles. These instructors have helped thousands of other beginners grasp essential IT and cybersecurity topics. Get ready to take your first steps into cybersecurity by diving into core concepts needed for any cybersecurity role. Build practical skills and gain confidence as you begin your cybersecurity journey.
    Cybersecurity Foundations
    Get everything you need to start your cybersecurity career journey, and stop wasting your time (and money) sorting through unreliable information from questionable sources. While the industry offers very lucrative career opportunities, finding accurate, relevant information to break into the field can be incredibly frustrating. That’s why we’ve crafted this foundational course, with curated content from expert instructors covering core concepts found across all cybersecurity roles. Build practical skills and gain confidence as you begin your cybersecurity journey.

    Instructed by

    Instructor
    Jennifer Barnabee

    Most of Jennifer's career has been focused on content creation in some form. As an open-source intelligence analyst, she wrote and edited short and long-form reports for business consumers. As a technical writer for the software team behind Apache NiFi, she wrote user documentation, taught in-person training courses, and created online video tutorials. As a product manager, she created product requirements, user documentation, and video demonstrations. She is currently completing her Master’s degree in Learning Design and Technology at the University of Maryland Global Campus.

    Provider
    Cybrary Logo
    Certification Body
    ISC2
    Certificate of Completion

    Complete this entire course to earn a Entry-Level Cybersecurity Training Certificate of Completion