Cybersecurity Essentials

Course Overview:

This course aims to provide a solid foundation to jump-start your professional career in Cybersecurity.   

The state of art learning materials and 24/7 virtual lab environment provided in this course will make effective contributions to your real-life work performances in the industry. A total of 12-hours of live classes, lifetime access to prescribed textbooks, one year of access to extensive learning materials from U-certify, and one on one academic consultations offered in this course will significantly reshape your confidence level and knowledge-based performance in the competitive job market.

In this course, you will learn the cybersecurity basics and know how to work with infrastructure security, network security, security devices, local network security, access control monitoring systems, and external threats. By completing this course, you should be able to master the fundamental concepts and methodologies being used to combat cybercrimes in the contemporary digital world. 

Course Structure:

This course integrates a four-part progressive learning pathway starting from your internal work areas to the external territory of world-wide-web, internet, and cloud environments. The four parts of the progressive learning journey are:

A. Securing infrastructure
B. Securing Local Host
C. Securing Local Network, and
D. Securing Perimeter from external threat.

What you need to know (Prerequisite):

  • Basic/elementary knowledge on Windows OS, Office Application Packages (Word, Excel, PowerPoints), Internet browsers (e.g., Chrome), Computer devices (Monitor, Mouse, Printer etc.)
    This book assumes that you are a competent computer user. That means you have used a computer at work and at home, are comfortable with email and web browsers, and know what words like RAM and USB mean.

Career Opportunities

  • Information security officer
  • Cyber Risk Officer
  • Cybersecurity Architect

Mode of Delivery

  • Online – Trainer-led and self-paced
  • Face to face – Trainer-led and blended

Prescribed Textbook (Included with the course fee)

J., C., Grow, C., Craig, P. and Short, C., 2018. Cybersecurity Essentials. John Wiley & Sons.

Prescribed Learning Materials (Included with the course fee)

Cybersecurity Essential. uCertify, USA

Course Fee

Introductory Video

Key Features

Who should do the course

  • Students preparing for a career in IT, networking, cybersecurity
  • Network professionals who want to improve their network security skills
  • Management personnel who need to understand the cybersecurity threats they face and basic options for confronting those threats.
  • This course can be a great resource to help you prepare certification for the CompTIA Security+ or Microsoft MTA – 98-367

What you will learn

After successful completion of this course the students should be able to:

  • Secure IT networks and infrastructure
  • Protect data when it passes unprotected territory of the Internet
  • Handle Cybersecurity challenges, and techniques
  • Possess a professional cybersecurity skillset

Study Load

Course Content – Cybersecurity Essentials

Part A
Securing Infrastructure
• Infrastructure Security in the Real World
• Understanding Access-Control and Monitoring Systems
• Understanding Video Surveillance Systems
• Understanding Intrusion-Detection and Reporting Systems
• Infrastructure Security: Review Questions and Hands-On Exercises
Part B
Securing Local Host
• Local Host Security in the Real World
• Securing Devices
• Protecting the Inner Perimeter
• Protecting Remote Access
• Local Host Security: Review Questions and Hands-On Exercises
Part C
Securing Local Network
• Local Network Security in the Real World
• Networking Basics
• Understanding Networking Protocols
• Understanding Network Servers
• Understanding Network Connectivity Devices
• Understanding Network Transmission Media Security
• Local Network Security: Review Questions and Hands-On Exercises
Part D
Securing Perimeter
• Perimeter Security in the Real World
• Understanding the Environment
• Hiding the Private Network
• Protecting the Perimeter
• Protecting Data Moving Through the Internet
• Tools and Utilities
• Identifying and Defending Against Vulnerabilities
• Perimeter Security: Review Questions and Hands-On Exercises