Cybersecurity Essentials Course

Cybersecurity Essentials Course

Short courses Online, open to everyone.

Be a cyber defender with our Cybersecurity courses Online.

Learn Cybersecurity with our Cybersecurity courses Online – short courses open to everyone.

Cisco Networking Academy

A single breach can have huge consequences for a company’s ability to function, hurting the bottom line and causing disruption in the daily lives of millions of people. This is why the demand for security professionals continues to grow. Get onboard—and develop an understanding of cybercrime, security principles, technologies, and procedures used to defend networks. Then decide whether you want to pursue an entry-level networking or security role professionally. Recommended for those planning to study for the Cisco CCNA R&S, CCNA Cyber Ops or Cisco CCNA Security Certifications.

Cybersecurity Essentials Course covers foundation knowledge and essentials skills in all security domains in the cyber world – information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defence and mitigation techniques use in protecting businesses.

Learning Aims

This cybersecurity course helps you:

  • Understand the players in the cyber security world and motivation of cyber criminals and cybersecurity professionals.
  • Learn to identify security attacks, symptoms, processes, and countermeasures.
  • Learn foundational and essential knowledge in various security domains – cybersecurity, information security, application security, host and system security, network security, mobile security, security laws, ethics, and security policies.
  • Build skills in security management, controls, protection and mitigation technologies.
  • Explore the roles of different cybersecurity professionals and career options.
  • Consider or advance a career in cybersecurity.

Learning Outcomes

Upon completion of this cybersecurity course, you will be able to:

  • Describe the characteristics of criminals and specialists in the cybersecurity realm.
  • Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
  • Describe the tactics, techniques and procedures used by cyber criminals.
  • Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high availability.
  • Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.
  • Explain the purpose of laws related to cybersecurity.

Course Design

This cybersecurity course features:

  • Easy-to-navigate graphical user interface.
  • 8 chapters containing accessible text and media text videos with closed captioning.
  • 8 chapter quizzes.
  • 34 interactive activities.
  • 10 Cisco Packet Tracer activities.
  • 12 hands-on labs.
  • 1 dynamic final quiz.

Course Content

Cybersecurity – A World of Wizards, Heroes and Criminals

Learn the characteristics of criminals and specialists in the cyber security realm.

  • The structure of the cybersecurity world and the reason it continues to grow with data and information as the prized currency.
  • The role of cyber criminals and what motivates them.
  • The factors that lead to the spread and growth of cybercrime.
  • The structure and efforts committed to expanding the cybersecurity workforce.
Learning objectives
  • Describe the cybersecurity world, criminals and professionals.
  • Compare how cybersecurity threats affect individuals, business and organisation.
  • Explain the structure and efforts committed to expanding the security workforce.

The Cybersecurity Sorcery Cube

Learn the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

  • The three dimensions of the McCumber Cube – the CIA Triad; the three states of data; the three categories of cybersecurity safeguards.
  • The ISO cybersecurity model, an international framework standard for the management of information systems.
Learning objectives
  • Explain the three dimensions of the McCumber Cube.
  • Detail the ISO cybersecurity model.
  • Explain the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

Cybersecurity Threats, Vulnerabilities, and Attacks

Threats, vulnerabilities, and attacks are the central focus of the cyber criminals. Learn tactics, techniques and procedures used by cyber criminals.

  • The types of malware and malicious code.
  • The different methods used in social engineering.
  • The different types of cyber attacks.
Learning objectives
  • Describe tactics, techniques and procedures used by cyber criminals.
  • Explain the types of malware, malicious code and social engineering.
  • Compare different types of cyber attacks.

The Art of Protecting Secrets

Learn the technologies, products and procedures used to protect confidentiality.

  • The principles of cryptology used to secure communications. It explains and compares symmetric and asymmetric encryption algorithms and used examples.
  • The access control models and techniques used to protect confidentiality.
  • The concept of obscuring data, and how data obfuscation and steganography accomplishes data masking.
Learning objectives
  • Outline technologies, products and procedures used to protect confidentiality.
  • Explain encryption techniques and access control techniques.
  • Present concepts of obscuring data.

The Art of Ensuring Integrity

Learn the technologies, products and procedures used to ensure data integrity.

  • The types of data integrity controls.
  • The purpose of digital signatures and certificates as tools for verifying authenticity of messages and documents.
  • The need for database integrity enforcement to ensure stability, performance and maintainability of the database system.
Learning objectives
  • Explain technologies, products and procedures used to ensure integrity.
  • Detail the purpose of digital signature and certificates.
  • Explain the need for database integrity enforcement.

The Realm of Five Nines

Learn the technologies, products, and procedures used to provide high availability.

  • The concepts of five nines, a high availability industry standard.
  • The technologies, procedures and design used by organisations to provide high system availability, redundancy, and resiliency to ensure quick recovery and continual operation.
  • Incident response plan and disaster recovery planning to improves high availability and business continuity.
Learning objectives
  • Explain the concepts of high availability.
  • Describe technologies, products, and procedures used to provide high availability.
  • Represent how incident response plan and disaster recovering planning improves high availability and business continuity.

Fortifying the Kingdom

Learn the technologies, processes and procedures used to defend all components of the network.

  • Host-hardening includes securing the operating system, implementing an anti-virus solution, and using host-based solutions such as firewalls and intrusion detection systems.
  • Server hardening includes managing remote access, securing privileged accounts, and monitoring services.
  • Data protection includes file access control and implementing security measure to ensure the confidentiality, integrity, and availability of data.
  • Device hardening also involves implementing proven methods of physically securing network devices.
Learning objectives
  • Explain system, servers and data protection.
  • Explain network infrastructure and end device protection.
  • Explain physical security measures used to protect network equipment.

Joining the Order of Cybersecurity Specialists

Understand the cybersecurity domains and controls; laws and ethics, various roles in the cybersecurity profession.

  • The security domains and proper controls in each domain.
  • The laws governing security, and ethical behaviour.
  • The available cybersecurity tools.
  • The opportunities and roles in the cybersecurity profession.
Learning objectives
  • Discuss cybersecurity domains and controls within the CIA triad.
  • Explain ethics and cybersecurity laws.
  • Name the cybersecurity tools.
  • Explain how to become a cyber security professional.

Intended Audience

The cybersecurity course is designed for anyone interested in pursuing more advanced studies in the field of cybersecurity. This foundational course provides an overview of the cybersecurity field. The curriculum explores the characteristics of and tactics used by cyber criminals. It then delves into the technologies, products, and procedures cybersecurity professionals use to combat cybercrime. The curriculum is appropriate for those at many education levels and types of institutions, including high schools, universities, colleges, career and technical schools, and community centres.

Delivery Style

Online, self-paced.

Hardware Requirements

  • Computer with a minimum of 2 GB of RAM and 8 GB of free disk space.
  • High speed Internet access to download Oracle VirtualBox and the virtual machine image file.

Course Prerequisites

This is an intermediate level course. Prerequisite Introduction to Cybersecurity Course or equivalent knowledge recommended. We recommend completion of Introduction to Packet Tracer Course before attempting this course.

Get $25 off

Get $25 off

Receive a $25 gift voucher to use toward your first enrolment.

Discounts

Discounts

Available for alumni, concession cardholders, seniors, staff and students.

Employer Sponsorship

Employer sponsorship

Your employer may be willing to pay for your course. Find out more.

Course Features

Available dates for Cybersecurity Essentials Course

This course has no dates available. Be the first to know when we schedule more. Join the waiting list.