Cybersecurity Essentials - Part 2

In this course, you will assess the vulnerability of and apply basic protections for the network, operating systems, and endpoints. Your network consists of software, hardware, and media. Operating systems make it possible to use the hardware in your network. Endpoints are the devices, such as computers, servers, mobile phones, and tablets, that are used on your network. The knowledge and skills that you will learn will help you to maintain the integrity, confidentiality, and availability of your network and your data.

You will also learn about different ways to monitor your network and how to evaluate alerts that you receive. You will delve into the tools and techniques used to protect your network, including access control, firewalls, cloud security, and cryptography. These monitoring and defense tools, along with others, work together to create a layered defense-in-depth cybersecurity strategy. The knowledge and skills that you learn will help you defend networks against many types of attacks and quickly react to any exploits that may occur.

You will create policy documents that cover governance and compliance. You will learn about complying with standards of ethics and legal and regulatory frameworks. In addition, you will assess network and systems vulnerability and create a risk management plan. Finally, you will learn about post-incident response including forensic investigations, recovery methods, and incident response planning. All of these actions are critical aspects of network security.

Completion of Cybersecurity Essentials prepares you for the entry-level Cisco Certified Support Technician (CCST) Cybersecurity certification exam and entry-level cybersecurity positions such as Cybersecurity Technician, Cybersecurity Analyst, or Tier 1 Help Desk Support roles. You will learn vital skills like threat intelligence, network security, and risk management to protect yourself and organizations from cyber attacks. If you enjoy solving puzzles, are passionate about technology, and like working in teams, the field of cybersecurity may be a great fit for you!

  • Course Outline

    Module 1: Network Security

    Module 2: Endpoint and OS Security

    Module 3: Principles, practices and processes of network defense

    Module 4: Firewalls, Cryptography and Cloud Security

    Module 5: Evaluating security alerts

    Module 6: Vulnerability assessment and risk management

    Module 7: Incident Response

    Learning outcomes

    Assess the vulnerability of and apply basic protections for the network, operating systems, and endpoints.

    Learn about different ways to monitor your network and how to evaluate alerts that you receive.

    Create policy documents that cover governance and compliance

    Learn about complying with standards of ethics and legal and regulatory frameworks

    Assess network and systems vulnerability and create a risk management plan

    Learn about post-incident response including forensic investigations, recovery methods, and incident response planning

    Course evaluation

    -7 exams after each module

    -1 cumulative final exam

  • ● Ability to speak, understand and write in English (CLB6)

    ● Ability to use a computer with a stable internet connection.

    ● A background in IT is not required. This is a beginner to intermediate course.

    ● High school algebra

  • 650 CA$

  • Mario Morfin came to Canada as a new immigrant 21 years ago. He attended the University of Toronto and obtained a PhD in mathematics in 2010, where he also instructed calculus, algebra, and differential equations. Afterwards, he conducted research at York University with a focus on industrial applications, which he later used as a private consultant in diverse industries, including price prediction models, cryptocurrency market research, and machine learning. He has also participated in startup companies, where the focus of this work included cyber-security. Mario is an avid advocate of transferring skills and knowledge about technological development for the betterment of our community.

  • Training model: online

    Course length: 7 weeks, 35h

    Schedule: Mon and Wed (6:30-9pm)

    Dates:

Contact us today!

In collaboration with