Looking for a roadmap to a career in cybersecurity? You found it.
Kick off your career with purpose in the course that takes you behind the scenes at companies like Netflix and Lyft.
Move from a hobby interest to career fundamentals with real-world scenarios, demos, and career preparation.
Step into the shoes of practitioners on the front lines of cyber defense and put together your own professional-grade security plan.
Understand the careful calculations behind the security architecture that protects your valuable personal and business data.
Where will you make your impact in cybersecurity? Break down the roles and mindsets of rockstar CS practitioners in a uniquely personal learning environment.
Get your hands dirty with widespread frameworks like MITRE Att&ck and NIST CSF. Perform a real threat model on a potential attack vector and more. By the end of this course, you'll have more than just ambition on your side.
Deploy sophisticated tactics to respond to threats. You'll learn from past security events and live demos what protection and response look like at today's data-rich companies.
Develop a recruiter-ready security plan. Get input from a senior security professional as you pull together compliance, tools, and culture.
Add value to your role with cybersecurity evangelism. Learn how to lead from the best as your organization sets up protection plans and builds a security-first culture.
Erase complexity from the picture. Untangle 300+ certifications and domains to get a clear path to pursuing your dream role.
John will kick off your learning by outlining the vital role of cybersecurity in today's business world and the key concepts you'll refer to throughout the course.
Assignment #01: Research a major cyber incident that occurred in the last 5 years and identify how the incident was disruptive.
John parses down the broad domain of cybersecurity in specific CS roles and their requirements. Which area are you drawn to the most?
Assignment #02: Identify two domains in which you would be interested in pursuing a career. What appeals to you about them?
You'll mirror the process employed at data-rich companies to break down an attack. John will show you how to use the MITRE Att&ck framework to form a profile of the attacker.
Assignment #03: You will receive a case of a real attack on a company. Which Att&ck category do you think it falls under?
This class is about thinking with a mindset of threat modeling. You'll learn how to successfully identify threat actors and steps to determine a risk-reduction plan.
Assignment #04: Application #04: Perform a threat model on a scenario or threat vector.
Hackers can have many different goals behind an attack. You'll learn how to identify the "opportunities" for hackers at your company and prevent them with a few key tools.
Assignment #05: Research three WAF vendors. Compare and contrast the features of each.
So, your business has been attacked. Now what? You'll learn what to do first if an attack occurs and how to mitigate a worst-case scenario.
Assignment #06: You will receive a case of a real incident. Use the NIST CSF to create a defense and recovery plan for the incident and return to normal operations.
You will use Splunk to work with certain data as you detect and validate threats. Work in groups to create an alert and then present your findings to the class.
Assignment #07: Create a dashboard in Splunk and export it.
What are the tools and processes needed to perform your own cybersecurity checkups? You'll learn how to continually identify weaknesses in systems, remediate them, and harden defenses against attacks.
Assignment #08: Download Nessus Security Scanner and run it against your laptop. What did you find?
John will help you understand this opaque area of cybersecurity and introduce you to the tools used.
Assignment #09: Given a scenario/incident. How would you use digital forensics to discover the root cause of the incident?
John will share his own tried and true approaches for building security buy-in from teams and business partners. You'll review essential CS compliance requirements and how to implement them.
Assignment #10: Take a look at the resource John will share after class. Identify three key factors of PCI compliance. What makes PCI compliance important?
John will walk you through his process for compiling candidate profiles. He'll show you how to prepare yourself to stand out, from resumé through interview.
What makes a great CS expert?
Assignment #11: Assess what skills are most important for your current company or the company of your choice. What do you already know? Prepare answers to the questions discussed in class.
How does the pandemic affect the cybersecurity field? How are threats and best practices evolving alongside changes in how work gets done? You'll hear from John on key cybersecurity trends to pay attention to as you prepare to launch your career.
Assignment #12: Using what you've learned in the last 6 weeks, outline a cybersecurity strategy for the company of your choice.