Introduction
  • Course Introduction
  • Introduction to Cybersecurity
  • Common Cybersecurity Threats
  • Cybersecurity Best Practices
  • Securing Networks and Devices
  • Incident Response and Recovery
  • Legal and Ethical Issues in Cybersecurity
  • Cloud Security
  • Mobile Device Security
  • Social Engineering Attacks
  • Cryptography
  • Cybersecurity in the Internet of Things (IoT)
  • Course End