Explore a Career in Cybersecurity

Explore a Career in Cybersecurity

Getting into cybersecurity can be rewarding and lucrative! In fact, according to the U.S. Bureau of Labor Statistics, information security analysts can make over $100,000 per year. This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you.

The course will start by introducing the basics of cybersecurity. You will learn the types of threats companies face daily and how a cybersecurity specialist can help prepare for and prevent those threats. Finally, the course will cover cybersecurity learning paths and different types of cybersecurity jobs and salaries.

6 Weeks Access / 24 Course Hrs

  • Details
  • Syllabus
  • Requirements
  • Instructor

Details

This course explores a career in cybersecurity and reviews various topics, including cybersecurity roles, job requirements, problem-solving techniques, and cybersecurity concepts. This course will help you decide whether a career in cybersecurity is something that aligns with your talents and interests and, if so, the best next steps to pursue this lucrative career path.

Enrollment Options:
Instructor-Moderated
6 Weeks Access Course Code: cyb
Start Dates*May 15 | Jun 12 | Jul 17 | Aug 14
*Choose start date in cart
$129.00 USD
Self-Guided
3 Months Access Course Code: T14567
No Instructor, Start Anytime
$129.00 USD

Syllabus

In Lesson 1, we will introduce you to the course and give you an overview of cybersecurity and its major components. We will dive into the history and evolution of cybersecurity so you can see how it has grown throughout the years to become a significant business and technology concern. Finally, as you consider a career in cybersecurity, it is essential to understand what education and experience you will need, so we will take a look at those and other requirements, too.

In Lesson 2, we will learn about the various roles in cybersecurity that you may take on in an organization. We will examine the industries where cybersecurity is particularly important as well as why it is so important. We will get the scoop on the types of roles and industries you may want to pursue when you enter cybersecurity.

Although you may think of cybersecurity as a purely technical field, cybersecurity professionals also need essential soft skills. We will dive into the important communication skills required when dealing with clients, employees, management, and outside groups. In your cybersecurity career, you will most likely be working on teams, so we will look at teams in the workplace and how important team skills are. We will learn the characteristics of a problem solver. Lastly, you will explore the troubleshooting process and why it is important to follow the steps to identify a problem and correct it now and prevent it in the future.

This lesson will look at the different kinds of cybersecurity risks companies face. You will explore the tools and the data used to discover, identify, and mitigate attack threats. We will take a look at cybersecurity laws and regulations, why they exist, and how they impact cybersecurity.

Hackers and other bad actors can attack various levels of public and private computing. In this lesson, we dive into types of information security that affect all of us, from critical infrastructure vital to the operation of the country to corporate networks, the cloud, and even appliances in our homes through the Internet of Things. We will define critical infrastructure security and explore its parts. We will look at how security works in different areas to help secure our infrastructure. Next, we will examine other ways to protect the things that make our lives easier—and that people often do not realize need protecting.

In this lesson, we will explore the common concepts in cybersecurity and the specialized terminology its professionals use. We will dive into cryptography by defining and showing examples and how it is used. Next, we will explore why obfuscation is important in cybersecurity and the differences between threats and vulnerabilities. Smart businesses have a plan for when attacks happen, so we will look at Incident Response Plans, how they are created, and what they should contain. Finally, we will examine Identity and Access Management (IAM) and the IAM framework—authentication, authorization, and accounting.

This lesson will teach you about the types of threats companies face as they do their day-to-day work. After learning about the types of threats, we will examine how they happen and, most importantly, how they can be avoided. Not every threat is malicious; sometimes unwitting employees inadvertently give away information or an unsuspecting person bites on a phishing attempt. We will explore social engineering by defining it, giving examples, and learning about the four steps of the social engineering process.

While you don't need to be a programmer to be a cybersecurity professional, coding is important in protecting software from hackers. In Lesson 8, we will deliver the goods on secure coding. We will learn why it is crucial and see the qualities of secure coding. Next, we will look at frameworks created to give developers a process for implementing secure coding in both new and older applications. Finally, we will take a look at secure coding framework examples.

In this lesson, we will learn about cybersecurity from the perspective of the company or organization. We will explore how companies respond to attacks, and know how companies try to ensure their organization will recover from an attack after surviving and dealing with it. Then, we will revisit the various types of data important to businesses and how companies can protect that data. This is where cybersecurity specialists really shine!

In this lesson, we will explore cybersecurity in business. You will learn about security awareness and how to bring it to employees of a company, including how to develop a good Security Awareness Program (SAP). We will explore how to create a good security culture as well as a cybersecurity culture. These cultures are essential because when security is relevant to everyone in the company, they will participate in the process of cybersecurity for the company.

In Lesson 11, we will look at employment prospects and the future expectations for cybersecurity employment. We will explore some strategies to identify positions in the cybersecurity field that are best suited for a new cybersecurity employee. Since cybersecurity is a large profession with many different positions, it is important to home in on attributes important to you in a job and learn how to find the job best suited to you. Next, we will explore remote work and how it relates to a cybersecurity specialist. You will examine the benefits and challenges of working remotely for both an employee and the business. Finally, we will dive into the projected growth of cybersecurity and specific sub-areas where the most significant job growth is expected to occur.

As we wrap up the course, we will look at the best education paths, various cybersecurity certifications, and degrees that are in demand for different cybersecurity specialties. You will learn about the importance of and the types of continuing education. Finally, you will explore how to catch a company's attention with specific and highly developed resumes and cover letters to help you land a job.

Requirements

Prerequisites:

There are no prerequisites to take this course.


Requirements:

Hardware Requirements:

  • This course can be taken on either a PC, Mac, or Chromebook.

Software Requirements:

  • PC: Windows 10 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word Online
  • Adobe Acrobat Reader
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

There are no instructional material requirements to take this course.

Instructor

Sara Perrott

Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author, a former college professor, and is passionate about teaching the next generation of cybersecurity professionals. Sara has an MS in Cybersecurity and Information Assurance from WGU Washington and a BS in Information Systems Security from the University of Phoenix.

Instructor Interaction: The instructor looks forward to interacting with learners in the online moderated discussion area to share their expertise and answer any questions you may have on the course content.