Networking Essentials

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER  In the Networking Essentials course, you’ll be introduced to the fundamental principles and practices of computer networking. We’ll start with the basics, such as understanding network architecture, protocols, topologies, and how to secure a network. From there, we will explore different types of networks including local area networks (LANs), wide area networks (WANs), and even the internet itself. You will learn about the key protocols and technologies that allow devices to connect and communicate, diving into topics such as Ethernet, TCP/IP, and DNS. But it’s not just about theory; we’ll give you hands-on experience in network administration and troubleshooting, teaching you how to handle devices like routers and switches and how to solve network issues as they arise. By the end of this course, you’ll have a solid foundation in networking essentials, with the know-how to manage and maintain various network environments. What You’ll Learn At the end of this course, learners will be able to explain the purpose of common networking protocols and technologies. They will also be skilled in configuring and managing network devices, such as routers and switches. Additionally, learners will be adept at using network troubleshooting tools and techniques to diagnose and resolve network issues. Skills You’ll Gain Using network tools Network troubleshooting Designing small size network Roles Network Technician Network Engineer Network Administrator What You’ll Learn At the end of this course, learners will be able to explain the purpose of common networking protocols and technologies. They will also be skilled in configuring and managing network devices, such as routers and switches. Additionally, learners will be adept at using network troubleshooting tools and techniques to diagnose and resolve network issues. Skills You’ll Gain Using network tools Network troubleshooting Designing small size network Role Network Technician Network Engineer Network Administrator Course Outline Module 1: Internet Connection Module 2: Network Protocols and Architecture Module 3: Data Communications and Network Services Module 4: Home/Office Network Basics Module 5: Network Configuration Reqired Resources Laptop or PC, Windows 10, 4GB RAM or higher, Adequate Internet Connection (Network); CISCO Packet Tracer 8.0 or later (Software) Pre-Requisites A basic understanding of computer systems and internet browsing, or any courses related to Computer Fundamentals. Assessment One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, with the flexibility for learners to choose between remote or on-site participation. A performance-based formative assessment is offered, conducted synchronously. Learners have the option to participate remotely or on-site. A performance-based summative assessment is to be conducted synchronously, and learners can choose between remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Under the Junior Cybersecurity Analyst Pathway, Networking Essentials serves as the foundational course. It lays the groundwork for your journey into the world of cybersecurity, specifically in the domain of Endpoint Security.
Cybersecurity Network Defense

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER In the “Cybersecurity: Network Defense” course, you will embark on a journey to understand the vital aspects of cybersecurity, including how to defend systems and networks effectively. We cover a broad spectrum of topics such as access control, the functioning and application of firewalls, ensuring security in the cloud environment, and the practical applications of cryptography. Moreover, we delve into understanding network security data and how to evaluate security alerts proficiently. Throughout the course, you will have hands-on experiences that will empower you to set defensive measures in place, manage access controls, work with simulated firewalls, and make sense of various kinds of network data. By the end, you will be adept at assessing security alerts, equipped with the skills to be a line of defense in the ever-evolving landscape of cybersecurity. What You’ll Learn At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network. Skills You’ll Gain Detecting Intrusions Threat Monitoring and Analysis Roles Cybersecurity Officer Cybersecurity Analyst Network Analyst What You’ll Learn At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network. Skills You’ll Gain Detecting Intrusions Threat Monitoring and Analysis Role Cybersecurity Officer Cybersecurity Analyst Network Analyst Course Outline Module 1: Understanding Defense Module 2: System and Network Defense Module 3: Access Control Module 4: Access Control Lists Module 5: Firewall Technologies Module 6: Zone-Based Policy Firewalls Module 7: Cloud Security Module 8: Cryptography Module 9: Technologies and Protocols Module 10: Network Security Data Module 11: Evaluating Alerts Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox and virtual machine image file (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic Windows and Linux system concepts, basic understanding of computer networks, and binary and hexadecimal conversion; completed course Cybersecurity: Endpoint Security Assessment In this Cybersecurity: Endpoint Security course: One (1) diagnostic assessment is available, to be conducted asynchronously, and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. A performance-based formative assessment is to be offered, to be conducted synchronously, allowing learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification “Cybersecurity: Threat Management”, and the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Cybersecurity: Network Defense Cybersecurity: Endpoint Security is a prerequisite for Cybersecurity: Network Defense. After mastering the fundamentals of endpoint security, you’ll be ready to delve deeper into network defense strategies as part of the Junior Cybersecurity Analyst Pathway.
Cybersecurity: Endpoint Security

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER In the Cybersecurity: Endpoint Security course, you’ll begin with the foundational principles of cybersecurity, setting the stage to understand the common threats, vulnerabilities, and risks prevalent in today’s digital landscape. As we delve deeper, we’ll cover the nuances of different network protocol vulnerabilities and service vulnerabilities, with special emphasis on Windows and Linux endpoints. The course not only brings you face-to-face with the current trends and possible attacks but also equips you to counter these threats effectively through mitigation and defense strategies. By the end of your journey, you will have a rounded understanding of cybersecurity, capable of identifying prevalent threats and dissecting common attacks. Whether it’s understanding the critical concepts of endpoint operations and security or analyzing malware intricacies, this course has got you covered, preparing you to navigate the cyber world safely and confidently. What You’ll Learn At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles Cybersecurity Officer Network Administrator What You’ll Learn At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Role Cybersecurity Officer Network Administrator Course Outline Module 1: Introduction to Cybersecurity Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks Module 3: Securing Networks Module 4: Attacking the Foundation Module 5: Attacking What We Do Module 6: Wireless Network Communication Devices Module 7: Network Security Infrastructure Module 8: The Windows Operating System Module 9: Linux Overview Module 10: System and Endpoint Protection Module 11: Cybersecurity Principles, Practices, and Processes   Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Packet Tracer 8.0.1 or higher (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic understanding of computer networks, and knowledge of TCP/IP networking including network protocols, services, and processes; completed course Cybersecurity: Network Defense Assessment One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. A performance-based formative assessment is offered, conducted synchronously, allowing learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification “Cybersecurity: Network Defense”, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Networking Essentials is a prerequisite for Cybersecurity: Endpoint Security. Upon successfully completing this course, you’ll be prepared to advance to the next step in the Junior Cybersecurity Analyst Pathway.
IoT – Internet of Things: Connecting Things

HOME REGISTER 20 HOURS HYBRID ENGLISH 20 HOURS HYBRID ENGLISH HOME REGISTER In the “IoT – Internet of Things: Connecting Things” course, you’ll dive deep into the fundamental concepts that drive the Internet of Things (IoT). You’ll start by exploring the core reasons behind the move to connect everything, identifying what exactly can be connected, and learning the strategies to establish this extensive connectivity. The journey will take you through the workings of a typical IoT solution which encompasses sensors, local analytic capabilities, network connections, and the skills to analyze the collected data effectively. You will learn to enhance products, processes, or businesses through detailed instrumentation and data collection, starting from an end-to-end connection from a sensor to a gateway, all the way to networks and the cloud. Moreover, the course guides you in pinpointing problems solvable by IoT and helps you design an IoT system precisely catered to solve those issues. It is a comprehensive approach to understanding and utilizing IoT in real-world scenarios. What You’ll Learn At the end of this course, learners will be able to design circuits and develop microcontroller programs using Arduino with various components. They will also be proficient in developing Python programs on the Raspberry Pi to enable IoT functionality. Additionally, learners will be adept at utilizing Packet Tracer to simulate Python-integrated IoT systems and will be equipped to construct business models using the Business Model Canvas. They will also understand the applications of IoT in sectors like healthcare, energy, smart-city, and manufacturing. Furthermore, learners will recognize the significance of designing secure IoT solutions that safeguard devices, software, and data. Skills You’ll Gain Python programming for IoT IoT system design Roles IoT Developer IoT Product Manager What You’ll Learn At the end of this course, learners will be able to design circuits and develop microcontroller programs using Arduino with various components. They will also be proficient in developing Python programs on the Raspberry Pi to enable IoT functionality. Additionally, learners will be adept at utilizing Packet Tracer to simulate Python-integrated IoT systems and will be equipped to construct business models using the Business Model Canvas. They will also understand the applications of IoT in sectors like healthcare, energy, smart-city, and manufacturing. Furthermore, learners will recognize the significance of designing secure IoT solutions that safeguard devices, software, and data. Skills You’ll Gain Python programming for IoT IoT system design Roles IoT Developer IoT Product Manage Course Outline Module 1: Things and Connections Module 2: Sensors, Actuators, and Microcontrollers Module 3: Software is Everywhere Module 4: Fog Networks and Cloud Services Module 5: Industrial IoT Applications Module 6: Create an IoT Solution Required Resources Microsoft Windows or Mac OS (Software); Prototyping Lab Application, Cisco Packet Tracer 7.1 or later (Software); Raspberry Pi 3 CanaKit Ultimate Starter Kit, Sparkfun Inventor’s Kit for Arduino – V3.2, Multicolored Jumper Wires (40-pin Male to Female, 40-pin Male-to-Male, 40-pin Female-to-Female), Breadboard Jumper Wires (Hardware). Pre-Requisites Basic Python programming skills and foundational knowledge in networking and electronics Assessment In this IoT: Big Data and Analytics course: One (1) diagnostic assessment is available, to be conducted synchronously and is knowledge-based, with the flexibility for learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, offering learners the option of participating remotely or on-site. Two (2) formative assessments are offered, both concentrating on performance-based skills measurement and to be conducted synchronously. Learners have the option to participate remotely or on-site. Credit and Recognition This Fundamental Course is a stackable pre-requisite for the Hackathon Playbook and IoT Security, and the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways “IoT – Internet of Things: Connecting Things” requires prior completion of “IoT – Internet of Things: Big Data and Analytics.” This prerequisite ensures that you have the foundational knowledge needed for a smooth and successful progression in your IoT education.
Cybersecurity: Cyber Threat Management

HOME REGISTER 32 HOURS HYBRID ENGLISH 32 HOURS HYBRID ENGLISH HOME REGISTER In the “Cybersecurity: Cyber Threat Management” course, you will dive into the fundamental concepts essential in the field of cybersecurity. We kick things off with ethics and governance before moving onto practical skills such as network security testing and endpoint vulnerability assessment. Throughout the course, we maintain a strong focus on critical aspects like threat intelligence and risk management, equipping you with the knowledge to respond effectively post-incident. Our goal is to prepare you to effectively engage in threat management and incident response activities, becoming a valuable member of a cybersecurity operations team. By the end of the course, you’ll have the skills and confidence to play a pivotal role in managing cyber threats, standing on the front lines of defense in the ever-vital field of cybersecurity. What You’ll Learn At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles IoT Developer IoT Project Manager What You’ll Learn At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles Cyber Security Analyst Course Outline Module 1: Governance and ComplianceModule 2: Security AssessmentsModule 3: Threat IntelligenceModule 4: Endpoint Vulnerability AssessmentModule 5: Risk Management and Security ControlsModule 6: Digital Forensics and Incident Analysis and Response Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Virtual Machine Image File (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic Windows and Linux system concepts, and a basic understanding of computer network protocols, services, processes, and configurations; completed course Cybersecurity: Network Defense Assessment In this Cybersecurity: Cyber Threat Management course: One (1) diagnostic assessment is available, to be conducted asynchronously and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. Two (2) formative assessments are offered, one concentrating on knowledge and the other on performance-based skills measurement. Both formative assessments are to be conducted synchronously, giving learners the choice of participating remotely or on-site. A performance-based summative assessment is to be conducted synchronously, offering learners the option of remote or on-site participation. Credit and Recognition The certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Cybersecurity: Network Defense is a prerequisite for Cybersecurity: Cyber Threat Management. Upon successfully completing this course, you will have successfully completed the Junior Cybersecurity Analyst Pathway, equipping you with the skills and knowledge needed for a career in cybersecurity.
