Cybersecurity Foundations
Through this course, I Discovered how to identify and manage cybersecurity risks with expert guidance from instructor Malcolm Shore. This course introduces essential frameworks and standards, such as NIST and COBIT, to help me effectively understand and mitigate threats. Malcolm broke down the tactics used by cybercriminals, from hidden attacks to advanced persistent threats, while providing tools to separate legitimate concerns from hype, fear, and misinformation (FUD). I gained insight into the full cybersecurity process—covering risk management, defense strategies, and incident preparedness and response. Finally, I explored the global landscape of cybersecurity.