Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network.In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans. 1. Cybersecurity AwarenessWhat is security?Confidentiality, integrity, and availabilitySecurity baseliningSecurity concerns: HumansTypes of threatsSecurity controlsWhat is hacking?Risk managementData in motion vs. data at restModule review2. Network DiscoveryNetworking reviewDiscovery, footprinting, and scanningCommon vulnerabilities and exposuresSecurity policiesVulnerabilitiesModule review3. Systems HardeningWhat is hardening?Types of