Cybersecurity for Businesses - The Fundamental Edition

Get the knowledge you need to protect your business and reduce your risk from numerous threats targeting your company.
Rating: 4.5 out of 5 (229 ratings)
9,933 students
Cybersecurity for Businesses - The Fundamental Edition
Rating: 4.5 out of 5 (229 ratings)
9,933 students
Identify business critical data and what are some options to protect determine the risk for their business
Understand the Risk Mindset needed to protect the business
Determine the risk for their business

Requirements

  • Knowledge about business data and systems
  • Beginners in understanding Cyber Security
  • Document Software for collecting data (Microsoft Office)

Description

Are you a small business owner that is worried about being hacked?  Are you confused on where to start and how to begin?  Have you been looking for a course that teaches you the information/cybersecurity basics to best protect your business in a fun relaxed manner? 

If so, you are going to find that this course is absolutely perfect for you!

This course is designed to give you the tools you need to begin with the task of protecting your business or company.  This course can also be used as an introductory path for employees/individuals of company’s who want to start gaining knowledge toward a career in cybersecurity or information security.   Understanding these key concepts is the foundation for protecting businesses of all shapes and sizes.  

PERFECT FOR NOVICE OR BEGINNER

This course is designed to be primarily for students who have little to no background knowledge in the field of cybersecurity.

Course Curriculum

In the first section we will cover the differences between Small and Medium Businesses and why it is important to mitigate the risk.  Lastly, we will address what is the problem and why small businesses are the target of hackers. 

In section two, we will explore risk and how by understanding cyber risk for your company you can substantially reduce the potential impacts of a cyber attack. 

Section three will introduce you to the primary concepts around cyber insurance and how it is important for you to understand the pros and cons of having a policy.

By the end of this course, you will have gained a significant amount of knowledge and insight that will help you best protect your business or train your employees on cybersecurity. 

Who this course is for:

  • Average small business owners
  • NOT designed for Risk Management Practitioners
  • Anyone concerned about Ransomware
  • CIOs, IT Directors / Managers wanting to get a better understanding around protecting business
  • People looking for actionable steps to protect their company
  • Small Business Owners wanting to improve their security practices

Course content

3 sections • 10 lectures • 1h 47m total length
  • Introduction - Here is a little about me and why I am want to create training
    07:21
  • Small and Medium Stats - Businesses are the target and this lecture will address
    08:31
  • Information Security and Cybersecurity - Understanding/knowing the differences
    12:51
  • Small and Medium / The Why - They reason for creating this specific training
    14:09
  • Section One Quiz
    5 questions

Instructor

Chief Information Security Officer (CISO) and CISSP Trainer
Shon Gerber
  • 4.3 Instructor Rating
  • 267 Reviews
  • 10,152 Students
  • 12 Courses

Shon Gerber, Chief Information Security Officer (CISO), CISSP Trainer and Cybersecurity Expert

Shon Gerber, owner of "Reduce Cyber Risk”  – Providing Cybersecurity Insight and Direction for Businesses of all Sizes.

Background:

Chief Information Security Officer

I am currently working as the CISO for a privately held global manufacturing company that deals with a wide range of security challenges from manufacturing to strong online web presence.

Security Operations Center – Supervisor

I have worked as a supervisor within a Security Operations Center of one of the largest privately held companies in the world. Each day my team worked to protect our company from hackers attempting to gain access to our various computer systems on a global basis.

Senior Security Architect

I worked for an IT service provider as a Senior Security Architect serving a diverse customer base with business customers from medium to large companies.  Each of these companies had varying levels of cyber security requests and regulatory  requirements.  During that period I provided numerous levels of security consulting practices ranging from web applications to recommendations around secure coding practices.

U.S. Air Force Red Team Commander

I worked for 11 years as a member of the US Air Force Red Team (Aggressors) targeting government and military installations from both a cyber and physical security perspective. We focused our efforts on network and physical penetration testing providing gap and remediation training to US military installations.

Certifications

Certified Information Systems Security Professional (CISSP)

GIAC Legal Issues in Information Technology & Security (GLEG)

Microsoft Certified Systems Engineer (MCSE/MCSE Security)

CompTIA Networks +

CompTIA Security +

Certified HIPAA Security Specialist (CHSS)

Certified HIPAA Professional (CHP)

Adoptive Father of a very large family

Truly blessed to be the father of 7 children who have graced our family from the US, China and Uganda.  My overall goal is to provide training products and materials designed for businesses to best protect their digital assets and the livelihood of the owner and employees.