Foundations of Cybersecurity Program
Discover the fundamentals of cybersecurity. Learn how to develop an incident response action plan, and master the basics of hands-on security skills using key technologies.
Take your first step towards a career in cybersecurity and prepare for gaining a professional qualification in the subject in the future. Discover the fundamentals of cybersecurity. Learn how to develop an incident response action plan, and master the basics of hands-on security skills using key technologies.
Take your first step towards a career in cybersecurity and prepare for gaining a professional qualification in the subject in the future.
Foundations of Cybersecurity Program Highlights
|
Duration
|
|
Fee US$ 155 - US$ 310 |
|
Duration
|
|
Fee US$ 155 - US$ 310 |
Cybersecurity has become a critical requirement for every business, regardless of size. Cyber-attacks are increasing in number exponentially, particularly with the abundance of IoT devices. And whilst traditional firewall and authentication-based protection solutions are a good first line of defense, other approaches such as ‘assume compromise’ must now be included within a protection methodology. This means not only do cybersecurity experts need to master the technologies used to combat attacks, but they also need to understand, anticipate, and mitigate the ever-evolving vulnerabilities appearing day by day.
In this program you will be introduced to the fundamentals of cybersecurity, and the tools and methodologies used to recognize, defend, and prevent some of the most common forms of threat. You will master the basics of security services using PowerShell, Microsoft Advanced Threat Analytics, Microsoft Enterprise Threat Detection, Azure Active Directory, Windows Server 16, and SQL Server. You will discover how to plan an effective computer security incident response team (CSIRT). And you will develop a clear understanding of best practice protocol.
For individuals keen to take their first step in the important world of cybersecurity, this program is an ideal place to start.
This program comprises nine purposely designed courses that take you on a carefully defined learning journey.
It is a self-paced program, which means it is not run to a fixed schedule with regard to completing modules or submitting assignments. To give you an idea of how long the course takes to complete, it is anticipated that if you work 5-6 hours per week, you will complete the program in 12 weeks. However, as long as the program is completed by the end of your enrollment, you can work at your own pace. And you will be encouraged to stay connected with your learning community and mentors through the course discussion space.
The materials for modules are accessible from the start of the program and will remain available for the duration of your enrollment. Materials include videos, hands-on labs, exercises, and knowledge checks.
Enrollment in the program includes all nine courses. You cannot enroll for the courses separately.
As part of our mentoring service you will have access to valuable guidance and support throughout the program. We provide a dedicated discussion space where you can ask questions, chat with your peers, and resolve issues. Depending on the payment plan you have chosen, you may also have access to live classes and webinars, which are an excellent opportunity to discuss problems with your mentor and ask questions. Mentoring services may vary package wise.
Once you have successfully completed the program, you will earn your FutureSkills Prime Certificate of Participation.
You will:
- Have an understanding of the fundamentals of enterprise cybersecurity.
- Have an appreciation of the different types of cybersecurity threat.
- Have an understanding of threat detection techniques, tools and methodologies.
- Have an understanding of how to plan for a security incident response and build a computer. security incident response team (CSIRT).
- Have in depth understanding of red team vs blue team exercises.
- Be able to deploy and analyze PowerShell best practices.
- Know how to manage network identities.
- Know how to secure data in Microsoft Azure and SQL server.
- Have an understanding of Windows 10 and Microsoft Azure security services.
- Have an understanding of Windows Server 2016 security features.
- This program is specifically aimed at individuals who are keen to gain an understanding of cybersecurity methodologies.
- The skills introduced are valuable across every stage of advancement, from the college graduate looking to land their first career job, to an experienced developer seeking to expand their knowledge to include cybersecurity.
- A general understanding of the cloud and cloud services is beneficial.
This course is aligned with industry-approved occupational standards set by SSC NASSCOM. Once you’ve successfully completed this course, you will receive a cobranded FutureSkills Prime/SkillUp Online Certificate of Participation that confirms you have:
- Job-ready competencies
- Practical experience
- Assessed technical knowledge
The national occupational standards to which this course is aligned relate to the following job roles:
- Security Analyst
- Application Security Analyst
- Identity and Access Management Analyst
- Endpoint Security Analyst
- Compliance Audit Analyst
- Security Operations Centre Analyst
- Penetration Tester
- Consultant Network Security
- Forensic specialist
- Security Infrastructure Specialist
- Identity and Access Management Architect
Program Outline
Topics Covered
-
Getting Started
Topics Covered
-
Welcome
Topics Covered
-
Basic Concepts of Networking
Topics Covered
-
Cybersecurity Definitions
-
Current Cybersecurity Landscape
-
Assume Compromise Philsophy
-
Cost of a breach
-
Module Exam
Topics Covered
-
Red Team versus Blue Team Exercises
-
The Attacker's Objective
-
Red Team Kill Chain
-
Document Vulnerabilities
-
Module Exam
Topics Covered
-
Blue Team
-
Blue Team Kill Chain
-
Restrict Privilege Escalation
-
Restrict Lateral Movement
-
Attack Detection
-
Module Exam
Topics Covered
-
CIA Triad
-
Organization Preparations
-
Developing and Maintaining Policies
-
Module Exam
Topics Covered
-
Final Exam
Topics Covered
-
Welcome
Topics Covered
-
An Overview of the Modern Cyber Threat Landscape
-
Basic Access Control Models
-
Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats
-
Comparing signature-based and behavioral heuristic detection methods
-
Combating threat persistence
-
Penetration Testing
-
Posture Testing
-
Ethical Hacking
-
Module Exam
-
Subsection
Topics Covered
-
Windows Event Forwarding and intrusion detection
-
Microsoft Advanced Threat Analytics (ATA)
-
Windows Defender Advanced Threat Protection (ATP)
-
Microsoft Enterprise Threat Detection
-
Microsoft Security Risk Detection
-
AntiMalware Scan Interface (AMSI)
-
Logging and Auditing
-
Threat Detection Tools
-
Module Exam
Topics Covered
-
Microsoft Cloud App Security and Office 365 Cloud App Security
-
Office 365 Advanced Threat Protection
-
Office 365 Threat Intelligence
-
Azure Advanced Threat Detection
-
Azure Logging and Auditing
-
Microsoft Enterprise Mobility + Security (EMS)
-
Microsoft 365
-
Module Exam
Topics Covered
-
Layered Machine Learning defenses in Windows Defender Antivirus
-
Detecting persistent threats by using Windows Defender ATP
-
Enterprise Threat Detection behavioral monitoring
-
Microsoft comprehensive approach to cyber threat detection
-
Module Exam
Topics Covered
-
Final Exam
-
Lab
Topics Covered
-
Welcome to This Course
Topics Covered
-
Introduction
-
NIST-Framework
-
Prepare
-
Module Review
-
Module Exam
Topics Covered
-
Building a Secuirty Incident Response Team
-
Preparation
-
Module Exam
Topics Covered
-
Introduction
-
Practice Security Incident Response Report
Topics Covered
-
Final Exam
Topics Covered
-
Welcome
Topics Covered
-
Windows PowerShell Architecture
-
Powershell editions and versions
-
Running Windows PowerShell
Topics Covered
-
Managing Local Script Execution with Windows PowerShell Execution Policy
-
Managing Remote Execution Capabilities of Windows PowerShell
-
Constrained Endpoints
-
Language Mode
-
Anti-Malware Scan Interface (AMSI)
Topics Covered
-
Windows PowerShell DSC
-
Just Enough Administration (JEA)
-
Windows PowerShell Auditing and Logging
Topics Covered
-
Windows PowerShell-based attacks
-
Windows PowerShell-based security tools
-
Summary of Windows PowerShell-based security-related technologies
Topics Covered
-
Final Exam
Topics Covered
-
Getting Started
Topics Covered
-
Identity as a Service (IaaS), the new Control Plane
-
Security Privileged Access Roadmap: Stage 2
-
Module Exam
Topics Covered
-
Active Directory Security
-
Module Exam
Topics Covered
-
Identity Federation and Access Solutions for the Cloud
-
Azure Security Architecture
-
Module Exam
Topics Covered
-
Introduction
-
Authentication and Authorization in Active Directory
-
Module Exam
Topics Covered
-
Final Exam
-
Module 5 - Labs
Topics Covered
-
Welcome
-
Hands-On Lab Environment
Topics Covered
-
Authenticating Connections to SQL Server
-
Authorizing Logins to Connect to Databases
-
Module Exam
Topics Covered
-
Working with Server Roles
-
Working with Database Roles
-
Authorizing User Access to Objects
-
Module Exam
Topics Covered
-
Options for Auditing Data Access in SQL Server
-
Implementing SQL Server Audit
-
Module Exam
Topics Covered
-
Protecting Data With Encryption
-
Module Exam
Topics Covered
-
Securing Data in SQL Server
Topics Covered
-
Final Exam
Topics Covered
-
Introduction
Topics Covered
-
Evolution of attacks
Topics Covered
-
Secure boot and Unified Extensible Firmware Interface
-
Module Exam
Topics Covered
-
Built-in Windows 10 defenses
-
Module Exam
Topics Covered
-
Additional built-in software security features
-
Module Exam
Topics Covered
-
Windows 10 Creator Update
-
Ransomware Case Study
-
Module Exam
Topics Covered
-
Final Exam
Topics Covered
-
Welcome to This Course
Topics Covered
-
Server Hardening
-
Service Configuration
-
Account Configuration
-
Remote Administrative Access
-
Application Restriction
-
Firewall Configuration
-
Software Updates
-
Configuration Baselines
Topics Covered
-
Restricting Administrator Access
-
LAPS
-
Credential Guard
-
NTLM blocking
-
Protected Users
-
Authentication Policy Silos
-
Just Enough Administration
-
ESAE forests
-
Just in Time Administration
Topics Covered
-
Introduction to Containers
-
Container Types
-
Container Dependencies
-
Managing Container Images
-
Docker
-
Container Security Benefits
-
Containers versus VMs
Topics Covered
-
Secure Virtualization Workload
Topics Covered
-
Final Exam
Topics Covered
-
Welcome
Topics Covered
-
Azure Security Services
-
Video Introduction to Azure Network Security
-
Azure Public Cloud Services
-
Azure Networking
-
Network Access Control
-
Secure Remote Access and Cross Premises Connectivity
-
Video VNET Peering
-
Availability
-
Name Resolution
-
DMZ Architectures
-
Monitoring and Threat Detection
-
Module Summary
-
Module Exam
Topics Covered
-
Cloud Adoption changes
-
Dynamic cloud environments
-
Services in the cloud
-
Shared Responsibility for Security
-
Azure Security Center
-
Azure Security Center Case Study
-
Azure Backup
-
Azure Log Analytics
-
Module Exam
Topics Covered
-
Azure Application Gateway
-
Azure Disk and Storage Encryption
-
Data Security and Encryption Best Practices
-
Module Exam
Topics Covered
-
Understanding Microsoft Intune
-
Device Health Attestation
-
Security Aspects of Windows AutoPilot
-
Module Exam
Topics Covered
-
Final Exam
-
Final Lab
Topics Covered
-
NASSCOM Certificate
Earn your certificate
Once you have completed this program, you will earn your certificate.
Program details
Certificate
- FutureSkills Prime Certificate of Participation
About this Program
- 09 courses
- 22 skills
Includes
- Discussion space
- 07 Hands-on labs
- 193 Videos lectures
- 09 Final exams
- 25 Module exams

Create
- Secure SQL Server
- IAM baseline
- Azure Active Directory multi-factor authentication
- Device management with Intune
- Intune policies
Exercises to explore
- SQL Server Management Studio
- Microsoft Intune
- Azure portal
Want to know more?
Get a Free ConsultationFAQs
Absolutely. FutureSkills Prime courses are an excellent introduction to a subject. Check the course overview page to understand if you need any experience in the subject before enrolling, but most FutureSkills Prime courses require no previous knowledge to enroll. You will, however, require basic skills in math. But be assured that all FutureSkills Prime courses are a great way to discover the basics of a subject.
Yes. The skills required to be a cybersecurity specialist are in high demand. Many countries are currently experiencing a skills shortage in this area, thus choosing to build a career in this field should present you with great employment opportunities.
The average salaries for different roles are highly competitive and individuals working in cybersecurity are well remunerated. You also don’t need to have a degree in the subject to launch your career. Plus, work can often be carried out remotely, thus there are fewer barriers to finding a position in this arena than for those vacancies that require you to work in an office.
Foundations of Cybersecurity has been designed for students and learners who have no experience in the field of cybersecurity at all; you do not need to have worked in a cybersecurity role or have any previous knowledge. This program, therefore, provides an excellent introduction to the subject. Please be aware, though, that you do need basic math skills to be able to progress through the program.
This FutureSkills Prime program is a self-paced program, which means it is not run to a fixed schedule with regard to completing modules or submitting assignments. As long as the program is completed by the end of your enrollment, you can work at your own pace. And don’t worry, you’re not alone. You will be encouraged to stay connected with your learning community and mentors through the program discussion space.
The materials for each module are accessible from the start of the program and will remain available for the duration of your enrollment. Methods of learning and assessment will include videos, reading material, and knowledge checks.
Once you have successfully completed the course, you will earn your Certificate of Completion.
Yes, once you have successfully completed the program, you will earn a Certificate of Completion.
Leave your details and our training consultant will be in touch with you.