Cybersecurity Foundations: Threats Networks, and IoT Protection

This course is part of Information Assurance Analysis Specialization

Instructor: Jason Crossland

What you'll learn

  •   Understand the relationship between malware, vulnerabilities, and exploits, and identify major types of malware using catalogs and signatures.
  •   Learn how to collect and analyze network traffic with NetFlow and tools like SiLK or Wireshark to detect and interpret potential threats.
  •   Explore internet addressing fundamentals, including IPv4 and IPv6, and utilize tools like WHOIS and BGP routing for host and network lookups.
  •   Gain practical experience in securing IoT environments by building frameworks, understanding privacy risks, and implementing security measures.
  • Skills you'll gain

  •   TCP/IP
  •   Cybersecurity
  •   Network Security
  •   Malware Protection
  •   Docker (Software)
  •   Internet Of Things
  •   Network Routing
  •   Network Analysis
  •   Network Monitoring
  •   Network Protocols
  •   Border Gateway Protocol
  •   Threat Detection
  •   Cyber Risk
  •   Vulnerability Assessments
  • There are 5 modules in this course

    This course stands out by combining practical exercises with foundational knowledge, ensuring you’re ready to apply what you learn to real-world situations. Whether you’re a beginner or expanding your cybersecurity expertise, completing this course will enhance your ability to protect networks, manage internet space, and secure IoT devices—skills in high demand across the IT sector.

    Malware, Vulnerabilities, Exploitation and AV

    NetFlow and The SiLK Toolkit

    Addressing, BGP and Lookup

    Internet of Things (IoT)

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved