In the Cybersecurity: Endpoint Security course, you’ll begin with the foundational principles of cybersecurity, setting the stage to understand the common threats, vulnerabilities, and risks prevalent in today’s digital landscape. As we delve deeper, we’ll cover the nuances of different network protocol vulnerabilities and service vulnerabilities, with special emphasis on Windows and Linux endpoints. The course not only brings you face-to-face with the current trends and possible attacks but also equips you to counter these threats effectively through mitigation and defense strategies. By the end of your journey, you will have a rounded understanding of cybersecurity, capable of identifying prevalent threats and dissecting common attacks. Whether it’s understanding the critical concepts of endpoint operations and security or analyzing malware intricacies, this course has got you covered, preparing you to navigate the cyber world safely and confidently.
At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware.
At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware.
Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks
Module 3: Securing Networks
Module 4: Attacking the Foundation
Module 5: Attacking What We Do
Module 6: Wireless Network Communication Devices
Module 7: Network Security Infrastructure
Module 8: The Windows Operating System
Module 9: Linux Overview
Module 10: System and Endpoint Protection
Module 11: Cybersecurity Principles, Practices, and Processes
Required Resources
Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Packet Tracer 8.0.1 or higher (Software); High-speed Internet Connection (Network)
Pre-Requisites
PC and internet navigation skills, basic understanding of computer networks, and knowledge of TCP/IP networking including network protocols, services, and processes; completed course Cybersecurity: Network Defense
Assessment
One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation.
A performance-based formative assessment is offered, conducted synchronously, allowing learners to choose between remote or on-site participation.
A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation.
Credit and Recognition
Learners are eligible to take the CISCO Certification “Cybersecurity: Network Defense”, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged.
This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods.
Learning Pathways
Networking Essentials is a prerequisite for Cybersecurity: Endpoint Security. Upon successfully completing this course, you’ll be prepared to advance to the next step in the Junior Cybersecurity Analyst Pathway.