Brand Image
Loading ...

Batangas State University, The National Engineering University

Cybersecurity: Endpoint Security

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER In the Cybersecurity: Endpoint Security course, you’ll begin with the foundational principles of cybersecurity, setting the stage to understand the common threats, vulnerabilities, and risks prevalent in today’s digital landscape. As we delve deeper, we’ll cover the nuances of different network protocol vulnerabilities and service vulnerabilities, with special emphasis on Windows and Linux endpoints. The course not only brings you face-to-face with the current trends and possible attacks but also equips you to counter these threats effectively through mitigation and defense strategies. By the end of your journey, you will have a rounded understanding of cybersecurity, capable of identifying prevalent threats and dissecting common attacks. Whether it’s understanding the critical concepts of endpoint operations and security or analyzing malware intricacies, this course has got you covered, preparing you to navigate the cyber world safely and confidently. What You’ll Learn At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles Cybersecurity Officer Network Administrator  What You’ll Learn At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Role Cybersecurity Officer Network Administrator  Course Outline Module 1: Introduction to Cybersecurity Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks Module 3: Securing Networks Module 4: Attacking the Foundation Module 5: Attacking What We Do Module 6: Wireless Network Communication Devices Module 7: Network Security Infrastructure Module 8: The Windows Operating System Module 9: Linux Overview Module 10: System and Endpoint Protection Module 11: Cybersecurity Principles, Practices, and Processes     Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Packet Tracer 8.0.1 or higher (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic understanding of computer networks, and knowledge of TCP/IP networking including network protocols, services, and processes; completed course Cybersecurity: Network Defense Assessment One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. A performance-based formative assessment is offered, conducted synchronously, allowing learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification “Cybersecurity: Network Defense”, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Networking Essentials is a prerequisite for Cybersecurity: Endpoint Security. Upon successfully completing this course, you’ll be prepared to advance to the next step in the Junior Cybersecurity Analyst Pathway.

IoT – Internet of Things: Connecting Things

HOME REGISTER 20 HOURS HYBRID ENGLISH 20 HOURS HYBRID ENGLISH HOME REGISTER In the “IoT – Internet of Things: Connecting Things” course, you’ll dive deep into the fundamental concepts that drive the Internet of Things (IoT). You’ll start by exploring the core reasons behind the move to connect everything, identifying what exactly can be connected, and learning the strategies to establish this extensive connectivity. The journey will take you through the workings of a typical IoT solution which encompasses sensors, local analytic capabilities, network connections, and the skills to analyze the collected data effectively. You will learn to enhance products, processes, or businesses through detailed instrumentation and data collection, starting from an end-to-end connection from a sensor to a gateway, all the way to networks and the cloud. Moreover, the course guides you in pinpointing problems solvable by IoT and helps you design an IoT system precisely catered to solve those issues. It is a comprehensive approach to understanding and utilizing IoT in real-world scenarios. What You’ll Learn At the end of this course, learners will be able to design circuits and develop microcontroller programs using Arduino with various components. They will also be proficient in developing Python programs on the Raspberry Pi to enable IoT functionality. Additionally, learners will be adept at utilizing Packet Tracer to simulate Python-integrated IoT systems and will be equipped to construct business models using the Business Model Canvas. They will also understand the applications of IoT in sectors like healthcare, energy, smart-city, and manufacturing. Furthermore, learners will recognize the significance of designing secure IoT solutions that safeguard devices, software, and data. Skills You’ll Gain Python programming for IoT IoT system design Roles IoT Developer IoT Product Manager What You’ll Learn At the end of this course, learners will be able to design circuits and develop microcontroller programs using Arduino with various components. They will also be proficient in developing Python programs on the Raspberry Pi to enable IoT functionality. Additionally, learners will be adept at utilizing Packet Tracer to simulate Python-integrated IoT systems and will be equipped to construct business models using the Business Model Canvas. They will also understand the applications of IoT in sectors like healthcare, energy, smart-city, and manufacturing. Furthermore, learners will recognize the significance of designing secure IoT solutions that safeguard devices, software, and data. Skills You’ll Gain Python programming for IoT IoT system design Roles IoT Developer IoT Product Manage Course Outline Module 1: Things and Connections Module 2: Sensors, Actuators, and Microcontrollers Module 3: Software is Everywhere Module 4: Fog Networks and Cloud Services Module 5: Industrial IoT Applications Module 6: Create an IoT Solution Required Resources Microsoft Windows or Mac OS (Software); Prototyping Lab Application, Cisco Packet Tracer 7.1 or later (Software); Raspberry Pi 3 CanaKit Ultimate Starter Kit, Sparkfun Inventor’s Kit for Arduino – V3.2, Multicolored Jumper Wires (40-pin Male to Female, 40-pin Male-to-Male, 40-pin Female-to-Female), Breadboard Jumper Wires (Hardware). Pre-Requisites Basic Python programming skills and foundational knowledge in networking and electronics Assessment In this IoT: Big Data and Analytics course: One (1) diagnostic assessment is available, to be conducted synchronously and is knowledge-based, with the flexibility for learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, offering learners the option of participating remotely or on-site. Two (2) formative assessments are offered, both concentrating on performance-based skills measurement and to be conducted synchronously. Learners have the option to participate remotely or on-site. Credit and Recognition This Fundamental Course is a stackable pre-requisite for the Hackathon Playbook and IoT Security, and the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways “IoT – Internet of Things: Connecting Things” requires prior completion of “IoT – Internet of Things: Big Data and Analytics.” This prerequisite ensures that you have the foundational knowledge needed for a smooth and successful progression in your IoT education.

Mastering GIS Basics with ArcGIS

HOME REGISTER 24 HOURS FACE-TO-FACE ENGLISH In the Mastering GIS Basics with ArcGIS course, you will come to grips with the fundamental concepts of geographic data and GIS technology. This course is crafted to take you on a journey where you’ll learn how to use GIS maps to bring real-world features to your fingertips, enabling you to visualize and explore them in depth. But it doesn’t stop there; you’ll delve into data analysis to extract valuable insights and learn how to share these maps, data, and other vital resources across your organization. The course encapsulates essential workflows, tools, and techniques pivotal in GIS, offering you hands-on experience through practical exercises. By the end of this immersive learning experience, you will have honed the skills needed to navigate and utilize GIS technology effectively, ready to apply them in real-world scenarios. What You’ll Learn At the end of this course, learners will be able to manage spatial information by creating, updating, and organizing data using Geographic Information System (GIS) software. They will also be skilled in displaying features on a GIS map accurately and accessing its information efficiently. Additionally, learners will be adept at employing standard workflows to analyze GIS data and address spatial challenges. Furthermore, they will be equipped to design GIS map layouts and web maps to visualize data and disseminate analysis results. Skills You’ll Gain Creating GIS based maps GIS data management Roles GIS Technician Basic GIS User Course Outline Module 1: The Basics of GIS Module 2: Understanding Geographic Data Module 3: Visualizing Data Module 4: Labeling Features Module 5: Working with Tabular Data Module 6: Creating and Editing Data Module 7: Evaluating Data for Analysis Module 8: Solving Spatial Problems Module 9: Designing Map Layouts Module 10: Sharing Geographic Information Required Resources i-series or equivalent processor, 8GB RAM, 1GB video card, 500GB available hard disk, 15” monitor or dual display (Hardware); Windows 10 or higher (Software); Internet connection of speed 5 Mbps or faster (Network) Pre-Requisites At least a High School or Senior High School Graduate Assessment Practical Assessment: Hands-on activities are prepared for this course to assess the attainment of learning outcomes Final Assessment: This exam measures your ability to create, modify, and manage a structural project using Revit Structures Credit and Recognition This Basic GIS course is offered in collaboration with Geodata Systems Technologies, Inc., the exclusive Esri distributor in the Philippines, and is affiliated with certifying entities such as Logotri-Philnet of the Local Government Academy, the Civil Service Commission, and the Philippine Society for Training and Development (PSTD). It is stackable and serves as a prerequisite for the Advanced GIS Micro-credential Program. This course is in developed and delivered in collaboration with Geodata Systems Technologies, Inc. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways This course is the foundational cornerstone of your journey into the world of Geographic Information Systems (GIS). It equips you with the essential skills and knowledge required to grasp the basics of GIS, setting the stage for your exploration of more advanced GIS concepts and applications.

Cybersecurity: Cyber Threat Management

HOME REGISTER 32 HOURS HYBRID ENGLISH 32 HOURS HYBRID ENGLISH HOME REGISTER In the “Cybersecurity: Cyber Threat Management” course, you will dive into the fundamental concepts essential in the field of cybersecurity. We kick things off with ethics and governance before moving onto practical skills such as network security testing and endpoint vulnerability assessment. Throughout the course, we maintain a strong focus on critical aspects like threat intelligence and risk management, equipping you with the knowledge to respond effectively post-incident. Our goal is to prepare you to effectively engage in threat management and incident response activities, becoming a valuable member of a cybersecurity operations team. By the end of the course, you’ll have the skills and confidence to play a pivotal role in managing cyber threats, standing on the front lines of defense in the ever-vital field of cybersecurity. What You’ll Learn At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles IoT Developer IoT Project Manager What You’ll Learn At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles Cyber Security Analyst Course Outline Module 1: Governance and ComplianceModule 2: Security AssessmentsModule 3: Threat IntelligenceModule 4: Endpoint Vulnerability AssessmentModule 5: Risk Management and Security ControlsModule 6: Digital Forensics and Incident Analysis and Response Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Virtual Machine Image File (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic Windows and Linux system concepts, and a basic understanding of computer network protocols, services, processes, and configurations; completed course Cybersecurity: Network Defense Assessment In this Cybersecurity: Cyber Threat Management course: One (1) diagnostic assessment is available, to be conducted asynchronously and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. Two (2) formative assessments are offered, one concentrating on knowledge and the other on performance-based skills measurement. Both formative assessments are to be conducted synchronously, giving learners the choice of participating remotely or on-site. A performance-based summative assessment is to be conducted synchronously, offering learners the option of remote or on-site participation. Credit and Recognition The certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Cybersecurity: Network Defense is a prerequisite for Cybersecurity: Cyber Threat Management. Upon successfully completing this course, you will have successfully completed the Junior Cybersecurity Analyst Pathway, equipping you with the skills and knowledge needed for a career in cybersecurity.

Data Analytics

HOME REGISTER 26 HOURS ONLINE ENGLISH 42 HOURS ONLINE ENGLISH HOME REGISTER In this Data Analytics course, you’ll dive deep into learning the best strategies and techniques for working with data using Power BI, a powerful tool that meets both business and technical needs. You’ll learn how to handle data from a range of sources, both relational and non-relational, and how to visualize and analyze that data to make informed decisions. We’ll also cover the essential skills needed to manage, deploy, and share reports and dashboards, promoting effective collaboration among teams. Whether you’re working with a business or on a technical project, this course equips you with the knowledge to leverage Power BI in optimizing data analysis and reporting processes. What You’ll Learn At the end of this course, learners will be able to prepare and organize data for analysis. They will also be equipped to develop analytical skills, encompassing data cleaning, analysis, and visualization, using Power BI. Furthermore, learners will be proficient in creating and managing workspaces and datasets in Power BI. Skills You’ll Gain Data analysis Azure Power BI Roles Data Analyst What You’ll Learn At the end of this course, learners will be able to prepare and organize data for analysis. They will also be equipped to develop analytical skills, encompassing data cleaning, analysis, and visualization, using Power BI. Furthermore, learners will be proficient in creating and managing workspaces and datasets in Power BI. Skills You’ll Gain Data analysis Azure Power BI Role Data Analyst Course Outline Module 1: Microsoft Data Analytics Module 2: Prepare Data for Analysis Module 3: Model Data in Power BI Module 4: Visualize Data in Power BI Module 5: Data Analysis in Power BI Module 6: Manage Workspaces and Datasets in Power BI Reqired Resources Laptop, Intel Core i5 or higher, 16GB, 1TB Storage, Graphics Card (Hardware); Microsoft Power BI (Software); Adequate Internet Connection (Network) Pre-Requisites The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist both in the cloud and on-premises. Assessment In this Data Analytics course: One (1) diagnostic assessment is available, conducted synchronously, and focuses on knowledge-based testing. Learners have the flexibility to choose between remote or on-site participation. Two (2) formative assessments are offered, one concentrating on knowledge and the other on performance-based skills measurement. Both formative assessments are available asynchronously, allowing learners to complete them at their own pace, with the option of remote or on-site participation. A summative assessment in Data Analytics is centered on performance-based skills evaluation. This summative assessment is to be conducted synchronously, giving learners the choice of participating remotely or on-site. Credit and Recognition The learner is eligible to take the Microsoft Certified: Power BI Data Analyst Associate. This course is facilitated by a Microsoft Certified professional. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Data Analytics Path: Data Management serves as your starting point on the path to becoming a skilled Data Analyst. This path ultimately leads to a broader understanding of data through Data Science.

2018 2nd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='2']

This will close in 0 seconds

2018 3rd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='3']

This will close in 0 seconds

2018 4th Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='4']

This will close in 0 seconds

2019 1st Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='1']

This will close in 0 seconds

2019 2nd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='2']

This will close in 0 seconds

2019 3rd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='3']

This will close in 0 seconds

2019 4th Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='4']

This will close in 0 seconds

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.