starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Introduction to Cybersecurity Fundamentals

Introduction to Cybersecurity Fundamentals

This course focuses on building a foundation for the principles of Cyber Security and protections of data within computers, devices and networks.

Kevin Cardwell
Kevin Cardwell
Cybersecurity | core | 1 hour 30 minutes |   Published: Nov 2023
In partnership with: Coursera

    Discussions

Overview

1KSTUDENTS*
96%RECOMMEND*

This course includes:

  • 1.5 hours of on-demand video  
  • Certificate of completion  
  • Direct access/chat with the instructor 
  • 100% self-paced online 

This course focuses on building a foundation for the principles of Cyber Security and protections of data within computers, devices and networks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted. Once your foundation has been set you will look at the best practices recommendations when it comes to protecting your data and privacy.

Skills You Will Gain

Automotive Cybersecurity
Cyber Security Awareness
Cybersecuirty
Cybersecurity Implementation
Cybersecurity management
Cybersecurity Tools

Learning Outcomes (At the end of this program you will be able to)

  • By the end of this course, participants will be able to employ effective strategies to identify the foundations of Cyber Security and the components of a standard cyber security model.  
  • Upon completion of this course, participants will possess the skills to build best practices mitigation methods to protect from the common forms of attacks. 
  • By the end of this course, participants will be equipped with the skills to explain how attackers perform a variety of popular attacks to include phishing, social engineering and ransomware. 
  • Upon completing this course, participants will gain insights into methods to implement to protect their data and maintain their privacy while being online and connected to public networks.

Prerequisites

Participants should have knowledge of computers and their usage as part of a network.

Who Should Attend

This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Module 0 - Introduction: Fundamentals of Cybersecurity
2Module 1 - Common Cybersecurity Threats and Attacks
3Module 2 - Cybersecurity Best Practices
4Module 3 - Data Protection and Privacy
5Module 4 - Incident Response (IR) and Reporting Best Practices

Segment 09 - Going Beyond Traditional Passwords

Segment 10 - Three Key Elements For Authentication

Segment 11 - Vulnerability Alert: Email Spoofing

Segment 12 - Top 6: Keys For Securing Your Emails At Work

Segment 17 - The Framework Of IR

Segment 18 - The Early Steps Of The IR Process

Segment 19 - The Final Steps of the IR Process

Segment 20 - Conclusion & Takeaways

Segment 01 - Introduction to the course & instructor

Segment 02 - Getting Started: Defining Cybersecurity

Segment 03 - Reviewing The Security Model: Authentication

Segment 04 - Your Data Online: Confidentiality, Integrity, & Availability

Segment 05 - Key Concepts: Authorization & Non-Repudiation

Segment 13 - Identifying Different Types Of Data

Segment 14 - Protecting Data Through Encryption

Segment 15 - Protecting Data Through Deletion (Part 1)

Segment 16 - Protecting Data Through Deletion (Part 2)

Segment 06 - Top 4: The Most Common Cyber Attacks

Segment 07 - The Psychology Behind Cyber Attacks

Segment 08 - Playing Defense Through Risk Mitigation

Kevin Cardwell

Kevin Cardwell

Kevin Cardwell is a cybersecurity expert with extensive experience working with banks and financial institutions across the Middle East, Europe, and the UK. A former leader of a U.S. Department of Defense Red Team, he achieved an impressive 100% success rate in system compromise operations, demonstrating unparalleled expertise in identifying and exploiting vulnerabilities.

Kevin has led high-impact consulting projects, including engagements with Petroleum Development Oman and the Central Bank of Oman. His work includes the design and implementation of customized security baselines for high-profile clients such as Oman Airport Management Company (OAMC), ensuring resilient protection for critical infrastructure.

He is the author of several acclaimed cybersecurity courses and publications, including Building Virtual Pentesting Labs for Advanced Penetration Testing and Advanced Penetration Testing for Highly Secured Environments, 2nd Edition. His areas of specialization include advanced penetration testing, network defense, and security architecture.

As President of Cyber2Labs and Lead Consultant at CESI, Kevin continues to shape the cybersecurity landscape, helping organizations build strong digital defenses against emerging threats. He holds certifications such as Certified Advanced Network Defender and Certified Advanced Penetration Tester, underscoring his commitment to excellence in information security.

In addition to his hands-on expertise, Kevin is a passionate educator and instructor, dedicated to equipping learners with the knowledge and practical skills necessary to navigate the complex world of cybersecurity with confidence. He actively promotes cutting-edge cybersecurity practices and is a trusted voice in the field for both professionals and organizations.

VIEW MY CHANNEL