img
img

Course Details!

Description

Cyber security Essentials covers foundation knowledge and essentials skills in all security domains in the cyber world -information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques use in protecting businesses.
Cybersecurity Essentials helps students to:
Understand the players in the cyber security world and motivation of cyber criminals and cybersecurity professionals.
Learn to identify security attacks, symptoms, processes, and countermeasures.
Learn foundational and essential knowledge in various security domains –cybersecurity, information security, application security, host and system security, network security, mobile security, security laws, ethics, and security policies.
Build skills in security management, controls, and protection and mitigation technologies.
Explore the roles of different cybersecurity professionals and career options.
Consider or advance a career in cybersecurity

What Will I Learn?

  • Describe the characteristics of criminals and specialists in the cyber security realm.
  • Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
  • Describe the tactics, techniques and procedures used by cyber criminals.
  • Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high availability.
  • Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.
  • Explain the purpose of laws related to cybersecurity.

Certificates

  • Official Attendance certificate from Cisco
  • Official Account on Cisco Networking Academy .

Cybersecurity–A World of Wizards, Herosand Criminals

  • Describe the cybersecurity world, criminals and professionals
  • .Compare how cybersecurity threats affect individuals, business and organization.
  • Explain the structure and efforts committed to expanding the security workforce.

The Cyber security Sorcery Cube in E-governance

  • Explain the three dimensions of the Mc Cumber Cube.
  • Detail the ISO cybersecurity model For Governments, enterprises and persons .
  • Explain the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

Cyber security Threats, Vulnerabilities, and Attacks on internet

  • Describe tactics, techniques and procedures used by cyber criminals.
  • Explain the types of malware, malicious code and social engineering
  • Compare different types of cyber attacks.

The Art of Protecting Secrets

  • Outline technologies, products and procedures used to protect confidentiality.
  • Explain encryption techniques and access control techniques .
  • Present concepts of obscuring data.

The Art of Ensuring Integrity

  • Explain technologies, products and procedures used to ensure integrity
  • Detail the purpose of digital signature and certificates
  • Explain the need for database integrity enforcement

The Realm of Five Nines

  • Explain the concepts of high availability.
  • Describe technologies, products, and procedures used to provide high availability.
  • Represent how incident response plan and disaster recovering planning improves high availability and business continuity.

how to Fortifying the Kingdom

  • Explain system, servers and data protection
  • Explain network infrastructure and end device protection
  • Explain physical security measures used to protect network equipment

Joining the Order of Cyber security Specialists

  • Discuss cybersecurity domains and controls within the CIA triad.
  • Explain ethics and cybersecurity laws.
  • Name the cybersecurity tools.
  • Explain how to become a cyber security professional

Comments