Acerca de este Curso
4.8
39 calificaciones
9 revisiones
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 11 horas para completar

Sugerido: 8 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English), Árabe (Arabic)
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 11 horas para completar

Sugerido: 8 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English), Árabe (Arabic)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
20 minutos para completar

Foundation - Module 1: Course Information

Palo Alto Networks Cybersecurity Specialization begins with this Foundation course. In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Foundation Module 1 contains the important course information - syllabus, objectives, tools and resources - that students will reference as they successfully complete the course. ...
Reading
2 readings
Reading2 lecturas
Foundation Course Syllabus10m
Foundation Course Information - Textbook , Work Roles10m
Horas para completar
1 hora para completar

Foundation Module 2: Cyber-Landscape Careers and Common Attacks

Foundation Module 2 examines the vulnerabilities and risks associated with Modern Computing trends such as Web 2.0 / Enterprise, Cloud and integrated apps and services. The module details how specific risks can easily lead to exploits. The Module also describes some of the recent high profile cyber attacks that have significantly affected a vast array of data and service architectures. ...
Reading
1 video (Total 5 minutos), 5 readings, 1 quiz
Reading5 lecturas
Cybersecurity Skills: Protecting Life in the Digital Age One Student at a Time10m
Modern Computing Trends10m
Cyber Seek - Cyberecurity Career Pathways10m
CyberSecurity Threats and Opportunities10m
Cyber 101 - NIST10m
Quiz1 ejercicio de práctica
Foundation Quiz #120m
Semana
2
Horas para completar
1 hora para completar

Foundation Module 3: Cyber-Threats

Module 3 identifies common attacker profiles and breaks down a typical attack into 7 identifiable stages. The chapter provides in depth descriptors of the tools and processes used at each attack stage, and importantly outlines strategies at each stage for defeating the attack. ...
Reading
1 video (Total 31 minutos), 2 readings, 2 quizzes
Video1 video
Reading2 lecturas
Modern Cyber Attack Strategy10m
Major Threat Actors10m
Quiz2 ejercicios de práctica
Cyber Threats Self Check6m
Foundation Quiz #210m
Horas para completar
1 hora para completar

Foundation Module 4: Malware and Spamming

Module 4 first introduces different attacker utilization of Bots and Botnets, including Command and Control (CnC), Spamming and DDoS implementations. The module contains detailed explanations of Malware types and categories, and explains how attackers identify vulnerabilities and perform exploits....
Reading
3 videos (Total 23 minutos), 2 readings, 1 quiz
Video3 videos
Video: Malware and Exploits8m
Video: Malicious Software8m
Reading2 lecturas
Bots and Botnets10m
Malware - Cyberattack Techniques and Types10m
Quiz1 ejercicio de práctica
Foundation Quiz #310m
Semana
3
Horas para completar
1 hora para completar

Foundation Module 5 - WiFi and Advanced Threats

Module 5 delivers a deep-dive analysis of common WiFi protocols, their specific vulnerabilities, and attacker strategies for exploits. Further discussions include details on DDoS and Advanced Persistent Threat modeling. ...
Reading
1 video (Total 9 minutos), 2 readings, 1 quiz
Video1 video
Reading2 lecturas
WiFi Vulnerabilities10m
DDoS and Advanced Threats10m
Quiz1 ejercicio de práctica
Foundation Quiz #410m
Horas para completar
1 hora para completar

Foundation Module 6 - Network Security Models

Module 6 importantly discovers the relationships and differences between regulatory compliance and security. Many current industry compliance standards are identified. The module delivers an in-depth analysis of the Zero Trust (employing the least-privilege best practices) and Perimeter-based network security models, architectures and designs. ...
Reading
2 videos (Total 4 minutos), 2 readings, 1 quiz
Video2 videos
Video: Network Security Models II57s
Reading2 lecturas
Network Security Models10m
Compliance and Security10m
Quiz1 ejercicio de práctica
Foundation Quiz #520m
Semana
4
Horas para completar
1 hora para completar

Foundation Module 7 - Cloud and Data Center Security

Module 7 explicitly defines virtual data center architectures and their data communications pathways. Core cloud security principles such as server consolidation, trust levels, selective security virtualization and dynamic computing fabric resource implementations are identified as critical components of effective cloud computing security architectures. ...
Reading
3 videos (Total 27 minutos), 2 readings, 1 quiz
Video3 videos
Video: Cloud Security II10m
Video: Data Center Security6m
Reading2 lecturas
Cloud Security10m
Data Center Security10m
Quiz1 ejercicio de práctica
Foundation Quiz #620m
Horas para completar
3 horas para completar

Foundation Module 8 - Best Practice and Principles

Module 8 presents security anti-malware strategies including signature-based, container-based, application whitelisting, and anomaly-based techniques. It further discusses the application of firewalls, mobile device management, patching and configuration management as strategies to implement to minimize vulnerabilities. Module 8 also provides detailed descriptions of network security devices including firewalls types (packet filtering, stateful inspection, application), Intrusion Detection and Prevention, VPN designs and protocols, Data Loss Prevention, Unified Threat Modeling and Security Information and Event Modeling. ...
Reading
2 videos (Total 17 minutos), 3 readings, 2 quizzes
Video2 videos
Video: Network Security Devices II8m
Reading3 lecturas
Network Security Technologies I10m
Network Security Technologies II10m
Password Strength Tester10m
Quiz1 ejercicio de práctica
Foundation Quiz #710m
4.8
9 revisionesChevron Right

Principales revisiones

por CBNov 11th 2018

I learned a lot from the course of Cyber security Foundation.\n\nI like the final project of this course, and I will recommend this course to my colleagues at my company.

por MINov 27th 2018

This course is very excellent for the cyber security and it provide me alot of information about the computer secuirty threats.

Instructor

James Dalton

Academy Curriculum Developer

Acerca de Palo Alto Networks

The Palo Alto Networks Cybersecurity Academy equips students with leading-edge cybersecurity knowledge and skills they will need to protect their digital way of life and prepare for the many unfilled jobs in cybersecurity....

Acerca del programa especializado Palo Alto Networks Cybersecurity

The Palo Alto Networks Cybersecurity Specialization prepares students for entry level careers in cybersecurity, with an emphasis on administering the Palo Alto Networks Next Generation Firewall. All courses also map learning objectives to the U.S. NIST/NICE framework and cybersecurity work roles....
Palo Alto Networks Cybersecurity

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.