Duration
10 Months
Prerequisites
None
Requirements
None
Course Summary
This course covers cybersecurity basics, including network security, data protection, risk management, and security threats. Students will explore network protocols, legal and ethical issues, physical security devices, and the role of programming in cybersecurity.
By the end of this course, you will be able to do the following:
Identify career opportunities in the field of cybersecurity.
Identify work-based learning (WBL) opportunities and create a resume.
Describe the skills required for a career in cybersecurity.
Explain the concepts of cybersecurity.
Describe the functions of basic computer components.
Describe the types of memory and basic computer terminology.
Describe the different types of operating systems and utilities.
Identify the different file formats and perform file operations.
Identify the different types of networks.
Explain the seven layers of the Open Systems Interconnection (OSI) model.
Describe the common ports and protocols of the OSI model.
Compare IPv4 and IPv6 addresses.
Identify the different types of security threats and social engineering techniques.
Identify various types of authentication, encryption, and access control methods.
Identify various cybersecurity crimes and laws.
Explain ethics and personal data security.
Describe the national agencies and supporting initiatives.
Describe the benefits of various security topologies.
Describe the types of business organizations and various quality control systems.
Describe the various physical security methods and systems.
Describe how to secure various network devices and a network.
Describe how to secure network cabling and media.
Describe the methods to secure mobile devices.
Describe how to secure operating systems.
Explain the use of virtualization and how to install a virtual machine.
Describe the different methods of remote access and remote authentication.
Explain programming in relation to cybersecurity.
Describe ways to store and protect data.
Describe disk management and types of backup.
Describe risks and the ways to mitigate risks