Brand Image
Loading ...

40 HOURS

HYBRID

ENGLISH

40 HOURS

HYBRID

ENGLISH

In the Cybersecurity: Endpoint Security course, you’ll begin with the foundational principles of cybersecurity, setting the stage to understand the common threats, vulnerabilities, and risks prevalent in today’s digital landscape. As we delve deeper, we’ll cover the nuances of different network protocol vulnerabilities and service vulnerabilities, with special emphasis on Windows and Linux endpoints. The course not only brings you face-to-face with the current trends and possible attacks but also equips you to counter these threats effectively through mitigation and defense strategies. By the end of your journey, you will have a rounded understanding of cybersecurity, capable of identifying prevalent threats and dissecting common attacks. Whether it’s understanding the critical concepts of endpoint operations and security or analyzing malware intricacies, this course has got you covered, preparing you to navigate the cyber world safely and confidently.

At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware.

  • Detecting intrusions
  • Threat monitoring and analysis
  • Cybersecurity Officer
  • Network Administrator 

At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware.

  • Detecting intrusions
  • Threat monitoring and analysis
  • Cybersecurity Officer
  • Network Administrator 

Course Outline

Module 1: Introduction to Cybersecurity

Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks

Module 3: Securing Networks

Module 4: Attacking the Foundation

Module 5: Attacking What We Do

Module 6: Wireless Network Communication Devices

Module 7: Network Security Infrastructure

Module 8: The Windows Operating System

Module 9: Linux Overview

Module 10: System and Endpoint Protection

Module 11: Cybersecurity Principles, Practices, and Processes

 

 

Required Resources

Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Packet Tracer 8.0.1 or higher (Software); High-speed Internet Connection (Network)

Pre-Requisites

PC and internet navigation skills, basic understanding of computer networks, and knowledge of TCP/IP networking including network protocols, services, and processes; completed course Cybersecurity: Network Defense

Assessment

One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation.

A performance-based formative assessment is offered, conducted synchronously, allowing learners to choose between remote or on-site participation.

A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation.

Credit and Recognition

Learners are eligible to take the CISCO Certification “Cybersecurity: Network Defense”, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged.

This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods.

Learning Pathways

Networking Essentials is a prerequisite for Cybersecurity: Endpoint Security. Upon successfully completing this course, you’ll be prepared to advance to the next step in the Junior Cybersecurity Analyst Pathway.

Scroll to top

2018 2nd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='2']

This will close in 0 seconds

2018 3rd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='3']

This will close in 0 seconds

2018 4th Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='4']

This will close in 0 seconds

2019 1st Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='1']

This will close in 0 seconds

2019 2nd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='2']

This will close in 0 seconds

2019 3rd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='3']

This will close in 0 seconds

2019 4th Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='4']

This will close in 0 seconds

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.