Cyber threats loom heavy in today’s digital world. Threats impact individuals and businesses. Due to the vast number of always-connected mobile devices and laptops, the ease of data access results in boundless opportunities for unauthorized access to important data. Along with those opportunities come modern-day threats to businesses and individuals from not only a financial perspective but also operational and compliance perspectives.

Over the past decade, the cybersecurity field has become increasingly significant due to the increased reliance on computer systems, the Internet, and wireless networks such as Bluetooth and Wi-Fi. In addition, the onset of COVID in 2020 forced the maturity of information technology simply because organizations required technology to continue their business. Advancements in information technology also resulted in significant impact to cybersecurity protocols. The growth in “smart” devices and their use in our everyday lives have created constant digital threats. As such, issues surrounding cybersecurity has become one of the biggest “fraud” schemes of our age.

The focus on technology is evident in all aspects of our lives. It extends from the use of household convenience technology such as Siri to the most sophisticated aspects of the cloud. Each day, cybersecurity continues to evolve. Advancements in technology have raised the level of acknowledgment for technology threats by both individuals as well as companies. Professionals must stay abreast of the ever-expanding threats posed by our technological age. Whether the threats are internal or external, they are very real and will cause harm to your organization in numerous ways.

This course serves as an introduction to the area of cybersecurity. Within this course we define concepts and terms, we evaluate the types of breaches and examine the current state of cybersecurity.

Learning Objectives
  • Discover and define the concepts of cybersecurity including terms and definitions.
  • Explore the meaning and impact of cyber breaches and threats.
  • Identify and understand the state of cybersecurity.
  • Explore and examine the types of breaches.
  • Explore current top cyber security threats.
  • Identify elements of a cyber program.
Last updated/reviewed: March 16, 2024
13 Reviews (75 ratings)

Reviews

5
Anonymous Author
This introduction to cybersecurity course provides a very comprehensive review of the concept of cybersecurity, the type of cybercrimes or breaches, the impact of data breach, the cyber framework established to deal with them. The course material is very helpful.

5
Anonymous Author
A very well written intro to cybersecurity course that covers a significant amount of information. The material is probably more geared towards information technology folks as an accountant it was quite difficult to learn and memorize all the lingo.

4
Anonymous Author
With the amount of computer and data risks that are out there today, it is important to really be knowledgeable about cyber risk. There are so many exploits out there that we need to really understand what to be on the lookout for.

5
Anonymous Author
Thank you so much, great course, I really appreciate it, you did a great job, amazing, wonderful!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

5
Anonymous Author
Always amazed at the potential for problems in the computer world. Very informative from a business and personal perspective .

5
Anonymous Author
Great course. This is such a hot topic and we are constantly battling various hacks. I appreciate the learning in this class.

5
Anonymous Author
Good primer of key concepts and terms. Helpful course, good reference material when I work with IT teams as a CPA.

5
Anonymous Author
Important information for this day & age. I learned some terms that I had not previously heard before.

5
Member's Profile
I found this course to be very informative and enjoyed learning about cybersecurity.

5
Anonymous Author
This is a great course on Cybersecurity. I liked the definitions and examples.

5
Member's Profile
Good course. Some additional real world examples would be great.

5
Anonymous Author
Good introductory course on cybersecurity giving the basics.

4
Anonymous Author
Good beginning overview of basic terms and considerations.

Prerequisites
Course Complexity: Foundational
No advanced preparation or prerequisites are required for this course.
Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
COURSE MATERIAL
  Introduction to Cybersecurity (Text Based Course)PDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam