Cybersecurity Essentials

Description:

 The interactive multimedia Cybersecurity Essentials course covers foundational knowledge and essentials skills in all security domains in the cyber world - information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques used in protecting businesses.

 

In addition, the course introduces learners to characteristics of cybercrime, security principles, technologies, and develop security policies that comply with cybersecurity laws.  Finally, procedures to implement data confidentiality, integrity, availability and security controls on networks, servers and applications will be taught.  The course includes lab activities, and multi-industry case studies.   

 

Format:

Self-paced interactive Online Course: This course is expected to take 30 hours to complete online as learner’s complete interactive multimedia materials, lab activities, case studies and complete learning quizzes. Additionally, the course has been updated with interactivity, multimedia and instructional format, which leverages the same graphical user interface (GUI) as in the CCNA Routing and Switching curriculum.  On average, learners will spend approximately 2 - 3 hours per week over 12 weeks completing course activities.  SCTE·ISBE provides access to the course for 12 weeks from date of purchase.

 

Instructor-Led Onsite Boot Camp Course: The Cybersecurity Essentials course may be delivered as an onsite boot camp over 2 days.

 

Online course access information will be emailed when the course is purchased.

 

Below are some of highlights for what can be found in the course:

 

  • Interactive content with easy to use graphical user interface (GUI)
  • Links to articles, case studies and websites helping the learner explore cybersecurity on their own
  • Over 34 activities, 10 packet tracer activities, 12 labs to reinforce learning
  • Assessments include 8 end of module quizzes and one (1) dynamic final exam
  • Average score of 70%, or greater, on all chapter exams.  Final exam requires 70%.

 

System Requirements:

  • High speed Internet (HSI) connection
  • Updated Internet Browser (Chrome, Firefox, Safari or Internet Explorer)
    • HTML 5 Support

Target Audience:

The target audience is anyone who desires a practical introduction to the field of secure networking. This includes field technicians, headend technicians, network operations center (NOC) staff, network engineers, network administrators, and IT help-desk staff.

 

Recommended Prerequisites:

  • Understanding Cybersecurity

 

Required Skills:

The successful completion of this course requires the following:

  • Reading Age Level (RAL) of 13
  • Basic computer literacy and awareness of the Internet
  • Prior experience with computer hardware, binary math, and basic electronics


Course Objectives:


  • Describe the characteristics of criminals and specialists in the cybersecurity realm.

  • Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

  • Describe the tactics, techniques and procedures used by cyber criminals.
  • Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high availability.
  • Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.
  • Explain the purpose of laws related to cybersecurity.

 


Course Modules:

 

  1. Cybersecurity – A World of Wizards, Heros and Criminals
  2. The Cybersecurity Sorcery Cube
  3. Cybersecurity Threats, Vulnerabilities, and Attacks
  4. The Art of Protecting Secrets
  5. The Art of Ensuring Integrity
  6. The Realm of Five Nines
  7. Fortifying the Kingdom
  8. Joining the Order of Cybersecurity Specialists

 

Course Outline:

 

Chapter 01: Cybersecurity – A World of Wizards, Heros and Criminals

Learn the characteristics of criminals and specialists in the cyber security realm.

  • Describe the cybersecurity world, criminals and professionals.
  • Compare how cybersecurity threats affect individuals, business and organization.
  • Explain the structure and efforts committed to expanding the security workforce.

Lab: Creating a Cyber World

Lab: Communicating in a Cyber World

Chapter Activities

Chapter Quiz

 

Chapter 02: The Cybersecurity Sorcery Cube

Learn the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

  • Explain the three dimensions of the McCumber Cube.
  • Detail the ISO cybersecurity model.
  • Explain the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

Lab: Exploring File and Data Encryption

Lab: Using File and Data Integrity Checks

Chapter Activities

Chapter Quiz

 


Chapter 03: Cybersecurity Threats, Vulnerabilities, and Attacks

Threats, vulnerabilities, and attacks are the central focus of the cyber criminals. Learn tactics, techniques and procedures used by cyber criminals.

  • Describe tactics, techniques and procedures used by cyber criminals.
  • Explain the types of malware, malicious code and social engineering.
  • Compare distinct types of cyber-attacks.

Lab: Upload 3.3.2.7 Packet Tracer - WEP WPA2 PSK WPA2 RADIUS

Chapter Activities

Chapter Quiz

 

Chapter 04: The Art of Protecting Secrets

Learn the technologies, products and procedures used to protect confidentiality.

  • Outline technologies, products and procedures used to protect confidentiality.
  • Explain encryption techniques and access control techniques.
  • Present concepts of obscuring data.

Lab: Configuring VPN Transport Mode

Lab: Configuring VPN Tunnel Mode

Chapter Activities

Chapter Quiz

 

Chapter 05: The Art of Ensuring Integrity

Learn the technologies, products and procedures used to ensure data integrity.

  • Explain technologies, products and procedures used to ensure integrity.
  • Detail the purpose of digital signature and certificates.
  • Explain the need for database integrity enforcement.

Chapter Activities

Chapter Quiz

 


Chapter 06: The Realm of Five Nines

Learn the technologies, products, and procedures used to provide high availability.

  • Explain the concepts of high availability.
  • Describe technologies, products, and procedures used to provide high availability.
  • Represent how incident response plan and disaster recovering. planning improves high availability and business continuity.

Lab: Upload 6.2.3.8 Packet Tracer - Router and Switch Redundancy

Lab: Router and Switch Resilience

Chapter Activities

Chapter Quiz

 

Chapter 07: Fortifying the Kingdom

Learn the technologies, processes and procedures used to defend all components of the network.

  • Explain system, servers and data protection.
  • Explain network infrastructure and end device protection.
  • Explain physical security measures used to protect network equipment.

Lab: Server Firewalls and Router ACLs

Chapter Activities

Chapter Quiz

 

Chapter 08: Joining the Order of Cybersecurity Specialists

Understand the cybersecurity domains and controls; laws and ethics, various roles in the cybersecurity profession.

  • Discuss cybersecurity domains and controls within the CIA triad.
  • Explain ethics and cybersecurity laws.
  • Name the cybersecurity tools.
  • Explain how to become a cyber security professional.

Lab: Upload 8.3.1.3 Packet Tracer - Skills Integrated Challenge

Chapter Activities

Chapter Quiz

Course FINAL Exam

Course Feedback

 

 

 

 


When:
11/11/2019 - 2/3/2020

Sign In

Rotating Banner with Links ad banner