Brand Image
Loading ...

32 HOURS

HYBRID

ENGLISH

32 HOURS

HYBRID

ENGLISH

In the “Cybersecurity: Cyber Threat Management” course, you will dive into the fundamental concepts essential in the field of cybersecurity. We kick things off with ethics and governance before moving onto practical skills such as network security testing and endpoint vulnerability assessment. Throughout the course, we maintain a strong focus on critical aspects like threat intelligence and risk management, equipping you with the knowledge to respond effectively post-incident. Our goal is to prepare you to effectively engage in threat management and incident response activities, becoming a valuable member of a cybersecurity operations team. By the end of the course, you’ll have the skills and confidence to play a pivotal role in managing cyber threats, standing on the front lines of defense in the ever-vital field of cybersecurity.

At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario.

  • Detecting intrusions
  • Threat monitoring and analysis
  • IoT Developer
  • IoT Project Manager

At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario.

  • Detecting intrusions
  • Threat monitoring and analysis
  • Cyber Security Analyst

Course Outline

Module 1: Governance and Compliance
Module 2: Security Assessments
Module 3: Threat Intelligence
Module 4: Endpoint Vulnerability Assessment
Module 5: Risk Management and Security Controls
Module 6: Digital Forensics and Incident Analysis and Response

photo4_4

Required Resources

Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Virtual Machine Image File (Software); High-speed Internet Connection (Network)

Pre-Requisites

PC and internet navigation skills, basic Windows and Linux system concepts, and a basic understanding of computer network protocols, services, processes, and configurations; completed course Cybersecurity: Network Defense

Assessment

In this Cybersecurity: Cyber Threat Management course:

  • One (1) diagnostic assessment is available, to be conducted asynchronously and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation.
  • Two (2) formative assessments are offered, one concentrating on knowledge and the other on performance-based skills measurement. Both formative assessments are to be conducted synchronously, giving learners the choice of participating remotely or on-site.
  • A performance-based summative assessment is to be conducted synchronously, offering learners the option of remote or on-site participation.

Credit and Recognition

The certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged.

The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods.

Learning Pathways

Cybersecurity: Network Defense is a prerequisite for Cybersecurity: Cyber Threat Management. Upon successfully completing this course, you will have successfully completed the Junior Cybersecurity Analyst Pathway, equipping you with the skills and knowledge needed for a career in cybersecurity.

Scroll to top

2018 2nd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='2']

This will close in 0 seconds

2018 3rd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='3']

This will close in 0 seconds

2018 4th Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='4']

This will close in 0 seconds

2019 1st Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='1']

This will close in 0 seconds

2019 2nd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='2']

This will close in 0 seconds

2019 3rd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='3']

This will close in 0 seconds

2019 4th Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='4']

This will close in 0 seconds

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.