Cybersecurity Online Course & Certificate

Technology Ed presents Cybersecurity Online Course & Certificate

Cybersecurity Online Course & Certificate

Course Description

Cybersecurity is a course that provides an overview of Information Security and Assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures with emphasis on practical aspects of Information Security. Topics include: security principles, threats, attacks, security models, security policies, overview of authentication, encryption, and certifications, security detection, security in Unix and Windows environments, business risk analysis, protection of information assets, examination of pre- and post-incident procedures, and an overview of the information security evaluation. Assessment: Students will be assigned 5 homework assignments, and 1 final exam for each course. This course is Instructor-led and delivered through our award-winning online Learning Management System. ... Read More »

Cybersecurity is a course that provides an overview of Information Security and Assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures with emphasis on practical aspects of Information Security. Topics include: security principles, threats, attacks, security models, security policies, overview of authentication, encryption, and certifications, security detection, security in Unix and Windows environments, business risk analysis, protection of information assets, examination of pre- and post-incident procedures, and an overview of the information security evaluation.

Assessment:

Students will be assigned 5 homework assignments, and 1 final exam for each course.

This course is Instructor-led and delivered through our award-winning online Learning Management System.

Read Less
Course Outcomes:
  • What is cybersecurity?
  • What are the threats?
  • How to identify vulnerabilities?
  • What is the cyber landscape?
  • What are the models and tools that can be used?
  • What are the associated cyber operations?
Course Details:

Prerequisites

Prior general IT experience is recommended.

Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Method of Obtaining Certification

A Certificate of Completion will be available to download upon successful completion of a course

Course Outline

  • Nature of the risks and liabilities within the cyber environment
  • The potential consequences of a cyber attack.
  • The importance of Information Technology (IT) systems
  • The national policy regarding cyber security and cyber terrorism
  • Risks and consequences associated with IT systems
  • Nature of the existing threat environment
  • Threat elements that seek to gain unauthorized access to the network.
  • Major cyber threat attack modes
  • Network vulnerabilities
  • Susceptibility to compromise from threat elements.
  • Importance of identifying cyber system vulnerabilities
  • Server configuration vulnerabilities
  • Application vulnerabilities
  • Firewall configuration vulnerabilities
  • System control and data system acquisition (SCADA) vulnerabilities
  • Cell phone vulnerabilities
  • Wireless access point vulnerabilities
  • Use of Basic Packet Capture
  • Use of network management protocols in identifying and resolving IT network vulnerabilities
  • Use of encryption in network security solutions
  • Introduction
  • Digital Data
  • The Physical Computer
  • PC Vivisection
  • Operating Systems
  • Programs
  • Web: Servers, browsers and HTML
  • Web: Build your webpage
  • Web: Client Side Scripting: non-event driven, event driven, forms
  • Web: Server Side Scripting
  • Web: Injection attacks & XSS
  • Networks, Protocols, the Internet:
  • Networks: LAN
  • Networks: Wireless
  • Information Assurance
  • Firewalls
  • Symmetric Encryption
  • Hashing
  • Digital Cryptography
  • Asymmetric Cryptography
  • Steganography
  • Forensics
  • Phases of a cyber attack
  • Network Attack
  • Network Defense
  • Malware
  • Case Studies

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.