Cyber-Security

medium

The aim of this course is to give a description about what cybersecurity is and the importance of it in the enterprises. To do this, the course explains the most important cybersecurity attacks, their potential threats and the consequences that networks could suffer if cybersecurity rules are not applied. In addition, the course gives security solutions through devices, methods and good practices to improve the security quality and reliability of the enterprise network system.

About the author

UPCT

UPCT

University

UPCT is a public University of Higher Education, located in Cartagena (Spain). UPCT offers more than 40 Bsc. and Msc. degrees. Most of its degrees are focused on technical and engineering studies: Civil, Industrial, Electronics, Naval, Telecommunications, Telematics, Agronomics, etc.

See author
This course is part of Specialization Telecommunication and Data

Score and Badges

1400 points

Unlock Complete Course badge


Knowledge

• Acquire basic knowledge about cybersecurity.
• Have a general view about their use in the industry.
• Learn some of the malwares that could reach the business network and how to differentiate them.
• Know the main symptoms networks could have if a malware is working on it.
• Learn some of the different types of cybersecurity methods and devices used to make a stronger network in the industry.
• Have a guideline explaining, step by step, what are the best security practices to follow in the industry.
• Get a general view about the future of cybersecurity in the industry, focused on I4.0


Skills

• Give a definition and explain the context of cybersecurity in the industry.
• Identify the malware installed in a system.
• Identify if a malware is running in a device according to some of the malware symptoms learned.
• Mitigate and reduce the impact of a malware or group of malware in a system.
• Know what the best devices are to use in each moment.
• Know what important the cybersecurity is in terms of the industry.


Competences

• Recognize the basic characteristics of cybersecurity.
• Explain what is the importance of the cybersecurity in the industry.
• Get a system and identify if it is infected and what malware is running on it.
• Easily identify software suspected of being malware.
• Get an infected system and provide the neccesary devices and methods to mitigate the malware effect.
• Prevent the malware installation and isolate infected devices.
• Give some steps to reduce the impact of a malware.
• Know how the cybersecurity could be improved.

Course Content

  • 1# Introduction
    • 1.1 Introduction to Cybersecurity
  • 2# Types
    • 2.1 Malware types. Part I
    • 2.2 Malware types. Part II
  • 3# Malware symptoms
    • 3.1 Malware symptoms
  • 4# Security methods and devices
    • 4.1 Security devices
    • 4.2 Security methods
  • 5# Recommended security practices
    • 5.1 Recommended security practices
  • 6# Future of Cyber-Security
    • 6.1 Future of Cyber-Security

Related Courses