Brand Image
Loading ...

Batangas State University, The National Engineering University

Networking Essentials

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER   In the Networking Essentials course, you’ll be introduced to the fundamental principles and practices of computer networking. We’ll start with the basics, such as understanding network architecture, protocols, topologies, and how to secure a network. From there, we will explore different types of networks including local area networks (LANs), wide area networks (WANs), and even the internet itself. You will learn about the key protocols and technologies that allow devices to connect and communicate, diving into topics such as Ethernet, TCP/IP, and DNS. But it’s not just about theory; we’ll give you hands-on experience in network administration and troubleshooting, teaching you how to handle devices like routers and switches and how to solve network issues as they arise. By the end of this course, you’ll have a solid foundation in networking essentials, with the know-how to manage and maintain various network environments. What You’ll Learn At the end of this course, learners will be able to explain the purpose of common networking protocols and technologies. They will also be skilled in configuring and managing network devices, such as routers and switches. Additionally, learners will be adept at using network troubleshooting tools and techniques to diagnose and resolve network issues. Skills You’ll Gain Using network tools Network troubleshooting Designing small size network Roles Network Technician Network Engineer Network Administrator What You’ll Learn At the end of this course, learners will be able to explain the purpose of common networking protocols and technologies. They will also be skilled in configuring and managing network devices, such as routers and switches. Additionally, learners will be adept at using network troubleshooting tools and techniques to diagnose and resolve network issues. Skills You’ll Gain Using network tools Network troubleshooting Designing small size network Role Network Technician Network Engineer Network Administrator Course Outline Module 1: Internet Connection Module 2: Network Protocols and Architecture Module 3: Data Communications and Network Services Module 4: Home/Office Network Basics Module 5: Network Configuration Reqired Resources Laptop or PC, Windows 10, 4GB RAM or higher, Adequate Internet Connection (Network); CISCO Packet Tracer 8.0 or later (Software) Pre-Requisites A basic understanding of computer systems and internet browsing, or any courses related to Computer Fundamentals. Assessment One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, with the flexibility for learners to choose between remote or on-site participation. A performance-based formative assessment is offered, conducted synchronously. Learners have the option to participate remotely or on-site. A performance-based summative assessment is to be conducted synchronously, and learners can choose between remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Under the Junior Cybersecurity Analyst Pathway, Networking Essentials serves as the foundational course. It lays the groundwork for your journey into the world of cybersecurity, specifically in the domain of Endpoint Security.

Cybersecurity Network Defense

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER In the “Cybersecurity: Network Defense” course, you will embark on a journey to understand the vital aspects of cybersecurity, including how to defend systems and networks effectively. We cover a broad spectrum of topics such as access control, the functioning and application of firewalls, ensuring security in the cloud environment, and the practical applications of cryptography. Moreover, we delve into understanding network security data and how to evaluate security alerts proficiently. Throughout the course, you will have hands-on experiences that will empower you to set defensive measures in place, manage access controls, work with simulated firewalls, and make sense of various kinds of network data. By the end, you will be adept at assessing security alerts, equipped with the skills to be a line of defense in the ever-evolving landscape of cybersecurity. What You’ll Learn At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network. Skills You’ll Gain Detecting Intrusions Threat Monitoring and Analysis Roles Cybersecurity Officer Cybersecurity Analyst Network Analyst What You’ll Learn At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network. Skills You’ll Gain Detecting Intrusions Threat Monitoring and Analysis Role Cybersecurity Officer Cybersecurity Analyst Network Analyst Course Outline Module 1: Understanding Defense Module 2: System and Network Defense Module 3: Access Control Module 4: Access Control Lists Module 5: Firewall Technologies Module 6: Zone-Based Policy Firewalls Module 7: Cloud Security Module 8: Cryptography Module 9: Technologies and Protocols Module 10: Network Security Data Module 11: Evaluating Alerts Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox and virtual machine image file (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic Windows and Linux system concepts, basic understanding of computer networks, and binary and hexadecimal conversion; completed course Cybersecurity: Endpoint Security Assessment In this Cybersecurity: Endpoint Security course: One (1) diagnostic assessment is available, to be conducted asynchronously, and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. A performance-based formative assessment is to be offered, to be conducted synchronously, allowing learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification “Cybersecurity: Threat Management”, and the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Cybersecurity: Network Defense Cybersecurity: Endpoint Security is a prerequisite for Cybersecurity: Network Defense. After mastering the fundamentals of endpoint security, you’ll be ready to delve deeper into network defense strategies as part of the Junior Cybersecurity Analyst Pathway.

Cybersecurity: Endpoint Security

HOME REGISTER 40 HOURS HYBRID ENGLISH 40 HOURS HYBRID ENGLISH HOME REGISTER In the Cybersecurity: Endpoint Security course, you’ll begin with the foundational principles of cybersecurity, setting the stage to understand the common threats, vulnerabilities, and risks prevalent in today’s digital landscape. As we delve deeper, we’ll cover the nuances of different network protocol vulnerabilities and service vulnerabilities, with special emphasis on Windows and Linux endpoints. The course not only brings you face-to-face with the current trends and possible attacks but also equips you to counter these threats effectively through mitigation and defense strategies. By the end of your journey, you will have a rounded understanding of cybersecurity, capable of identifying prevalent threats and dissecting common attacks. Whether it’s understanding the critical concepts of endpoint operations and security or analyzing malware intricacies, this course has got you covered, preparing you to navigate the cyber world safely and confidently. What You’ll Learn At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles Cybersecurity Officer Network Administrator  What You’ll Learn At the end of this course, learners will be able to explain the threats, vulnerabilities, and attacks that occur in the various domains. They will also be competent in recommending basic threat mitigation measures. Furthermore, learners will be adept at using malware investigation tools to understand malware features and will be proficient in evaluating endpoint protection and the impacts of malware. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Role Cybersecurity Officer Network Administrator  Course Outline Module 1: Introduction to Cybersecurity Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks Module 3: Securing Networks Module 4: Attacking the Foundation Module 5: Attacking What We Do Module 6: Wireless Network Communication Devices Module 7: Network Security Infrastructure Module 8: The Windows Operating System Module 9: Linux Overview Module 10: System and Endpoint Protection Module 11: Cybersecurity Principles, Practices, and Processes     Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Packet Tracer 8.0.1 or higher (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic understanding of computer networks, and knowledge of TCP/IP networking including network protocols, services, and processes; completed course Cybersecurity: Network Defense Assessment One (1) diagnostic assessment is available, conducted asynchronously, and is knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. A performance-based formative assessment is offered, conducted synchronously, allowing learners to choose between remote or on-site participation. A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation. Credit and Recognition Learners are eligible to take the CISCO Certification “Cybersecurity: Network Defense”, the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. This course is delivered in partnership with CISCO Networking Academy. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Networking Essentials is a prerequisite for Cybersecurity: Endpoint Security. Upon successfully completing this course, you’ll be prepared to advance to the next step in the Junior Cybersecurity Analyst Pathway.

Cybersecurity: Cyber Threat Management

HOME REGISTER 32 HOURS HYBRID ENGLISH 32 HOURS HYBRID ENGLISH HOME REGISTER In the “Cybersecurity: Cyber Threat Management” course, you will dive into the fundamental concepts essential in the field of cybersecurity. We kick things off with ethics and governance before moving onto practical skills such as network security testing and endpoint vulnerability assessment. Throughout the course, we maintain a strong focus on critical aspects like threat intelligence and risk management, equipping you with the knowledge to respond effectively post-incident. Our goal is to prepare you to effectively engage in threat management and incident response activities, becoming a valuable member of a cybersecurity operations team. By the end of the course, you’ll have the skills and confidence to play a pivotal role in managing cyber threats, standing on the front lines of defense in the ever-vital field of cybersecurity. What You’ll Learn At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles IoT Developer IoT Project Manager What You’ll Learn At the end of this course, learners will be able to use commands to gather network information and diagnose connectivity issues. They will also be proficient in explaining how endpoint vulnerabilities are assessed and managed. Furthermore, learners will be adept at evaluating security controls based on organization characteristics, and they will be equipped to apply various standards in incident handling procedures to a given incident scenario. Skills You’ll Gain Detecting intrusions Threat monitoring and analysis Roles Cyber Security Analyst Course Outline Module 1: Governance and ComplianceModule 2: Security AssessmentsModule 3: Threat IntelligenceModule 4: Endpoint Vulnerability AssessmentModule 5: Risk Management and Security ControlsModule 6: Digital Forensics and Incident Analysis and Response Required Resources Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox, Virtual Machine Image File (Software); High-speed Internet Connection (Network) Pre-Requisites PC and internet navigation skills, basic Windows and Linux system concepts, and a basic understanding of computer network protocols, services, processes, and configurations; completed course Cybersecurity: Network Defense Assessment In this Cybersecurity: Cyber Threat Management course: One (1) diagnostic assessment is available, to be conducted asynchronously and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation. Two (2) formative assessments are offered, one concentrating on knowledge and the other on performance-based skills measurement. Both formative assessments are to be conducted synchronously, giving learners the choice of participating remotely or on-site. A performance-based summative assessment is to be conducted synchronously, offering learners the option of remote or on-site participation. Credit and Recognition The certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged. The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods. Learning Pathways Cybersecurity: Network Defense is a prerequisite for Cybersecurity: Cyber Threat Management. Upon successfully completing this course, you will have successfully completed the Junior Cybersecurity Analyst Pathway, equipping you with the skills and knowledge needed for a career in cybersecurity.

2018 2nd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='2']

This will close in 0 seconds

2018 3rd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='3']

This will close in 0 seconds

2018 4th Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='4']

This will close in 0 seconds

2019 1st Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='1']

This will close in 0 seconds

2019 2nd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='2']

This will close in 0 seconds

2019 3rd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='3']

This will close in 0 seconds

2019 4th Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='4']

This will close in 0 seconds

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.