Cybersecurity Essentials - Part 2
In this course, you will assess the vulnerability of and apply basic protections for the network, operating systems, and endpoints. Your network consists of software, hardware, and media. Operating systems make it possible to use the hardware in your network. Endpoints are the devices, such as computers, servers, mobile phones, and tablets, that are used on your network. The knowledge and skills that you will learn will help you to maintain the integrity, confidentiality, and availability of your network and your data.
You will also learn about different ways to monitor your network and how to evaluate alerts that you receive. You will delve into the tools and techniques used to protect your network, including access control, firewalls, cloud security, and cryptography. These monitoring and defense tools, along with others, work together to create a layered defense-in-depth cybersecurity strategy. The knowledge and skills that you learn will help you defend networks against many types of attacks and quickly react to any exploits that may occur.
You will create policy documents that cover governance and compliance. You will learn about complying with standards of ethics and legal and regulatory frameworks. In addition, you will assess network and systems vulnerability and create a risk management plan. Finally, you will learn about post-incident response including forensic investigations, recovery methods, and incident response planning. All of these actions are critical aspects of network security.
Completion of Cybersecurity Essentials prepares you for the entry-level Cisco Certified Support Technician (CCST) Cybersecurity certification exam and entry-level cybersecurity positions such as Cybersecurity Technician, Cybersecurity Analyst, or Tier 1 Help Desk Support roles. You will learn vital skills like threat intelligence, network security, and risk management to protect yourself and organizations from cyber attacks. If you enjoy solving puzzles, are passionate about technology, and like working in teams, the field of cybersecurity may be a great fit for you!
-
Course Outline
Module 1: Network Security
Module 2: Endpoint and OS Security
Module 3: Principles, practices and processes of network defense
Module 4: Firewalls, Cryptography and Cloud Security
Module 5: Evaluating security alerts
Module 6: Vulnerability assessment and risk management
Module 7: Incident Response
Learning outcomes
Assess the vulnerability of and apply basic protections for the network, operating systems, and endpoints.
Learn about different ways to monitor your network and how to evaluate alerts that you receive.
Create policy documents that cover governance and compliance
Learn about complying with standards of ethics and legal and regulatory frameworks
Assess network and systems vulnerability and create a risk management plan
Learn about post-incident response including forensic investigations, recovery methods, and incident response planning
Course evaluation
-7 exams after each module
-1 cumulative final exam
-
● Ability to speak, understand and write in English (CLB6)
● Ability to use a computer with a stable internet connection.
● A background in IT is not required. This is a beginner to intermediate course.
● High school algebra
-
650 CA$
-
Mario Morfin came to Canada as a new immigrant 21 years ago. He attended the University of Toronto and obtained a PhD in mathematics in 2010, where he also instructed calculus, algebra, and differential equations. Afterwards, he conducted research at York University with a focus on industrial applications, which he later used as a private consultant in diverse industries, including price prediction models, cryptocurrency market research, and machine learning. He has also participated in startup companies, where the focus of this work included cyber-security. Mario is an avid advocate of transferring skills and knowledge about technological development for the betterment of our community.
-
Training model: online
Course length: 7 weeks, 35h
Schedule: Mon and Wed (6:30-9pm)
Dates:
Contact us today!
In collaboration with