Computer Networking and Cybersecurity are the heart of the digital transformation. Often unseen, networks enable us to stay connected as we move around freely using our laptop or smartphone. This interconnected world makes everyone more susceptible to cyber-attacks. A single breach can have huge consequences for a company’s ability to function, hurting the bottom line and causing disruption in the daily lives of millions of people.
Networking and Cybersecurity Essentials is a combination of Networking Essentials, Introduction to Cybersecurity and Cybersecurity Essentials courses offered in partnership with Michigan Information Technology Training. The course begins with the basic network concepts to help you set up a SOHO (small-office/home-office) network and put you on the path to managing a larger-scale business network. You will explore cyber trends, threats and the broader topic of cybersecurity in a way that will matter to YOU. This course will help you develop an understanding of cybercrime, security principles, technologies, and procedures to defend networks.
This course is offered in partnership with Michigan Information Technology Training.
Prerequisites: None
Course Objectives: Upon completion of this course, students will be able to...
- Explain how end-user devices and local networks interact with the global Internet.
- Explain the requirements for network connectivity.
- Build a small network using an integrated network router.
- Explain the importance of IP addressing.
- Explain how the protocols of the TCP/IP suite enable network communication.
- Configure an integrated wireless router and wireless clients to connect securely to the Internet.
- Configure basic network security.
- Build a simple computer network using Cisco devices.
- Troubleshoot common network issues found in home and small business networks.
- Explain the need and importance of cybersecurity.
- Explain the characteristics and value of personal data, and data within an organization.
- Recognize the characteristics and operation of a cyber attack.
- Interpret the trends in the cyber threat landscape.
- Understand how to protect devices from threats.
- Master how to safeguard your privacy.
- Learn techniques to protect organizations from cyber attacks.
- Recognize the behavior-based approach to cybersecurity.
- Understand legal and ethical issues in cybersecurity.
- Explain the opportunities for pursuing an education and a career in cybersecurity.
- Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
- Describe the tactics, techniques and procedures used by cyber criminals.
- Describe how technologies, products, and procedures are used to protect confidentiality.
- Describe how technologies, products, and procedures are used to ensure integrity.
- Describe how technologies, products, and procedures provide high availability.
- Explain how cybersecurity professionals use technologies, processes, and procedures to defend all components of the network.
- Explain the purpose of laws related to cybersecurity.
Course Outline:
Segment 1: Networking Essentials
Communications in a Connected World
Online Communications
Explore Networks
Peer to Peer Networks
Providing Network Services
Communications Principles
Network Design
Routing
Internet Protocol
Dynamic Addressing (DHCP)
IP Addressing
Transport Services
Build a Home Network
Security Considerations
Cisco Switches and Routers
Segment 2: Introduction to Cybersecurity
The Need for Cybersecurity
Attacks, Concepts, Techniques
Protecting Your Data and Privacy
Protecting the Organization
Your Future in Cybersecurity
Segment 3: Cybersecurity Essentials
Cybersecurity Experts or Criminals
The Cybersecurity Cube
Threats, Vulnerabilities, Attacks
The Art of Protecting Secrets
The Art of Ensuring Integrity
The Five Nines Concept
Protecting a Cybersecurity Domain
Becoming a Cybersecurity Specialist
Resources Included: Students will have access to the Cisco Networking Academy (Netacad) curriculum and course resources (Labs, Packet Tracer Activities, Reading Guides, Assessments, etc.). Michigan Information Technology Training is a Cisco Networking Academy and is offering the Cisco Netacademy Program in an asynchronous e-learning environment to enable students to learn valuable information and skills for increased access to opportunities in the global economy.
Additional Costs: None
Scoring System: Michigan Virtual and Michigan Information Technology Training do not assign letter grades, grant credit for courses, nor issue diplomas. A final score earned will be submitted to your school mentor for conversion to their own letter grading system. The final score will be calculated through total points earned within the following weighted categories: Chapter Reading Guides (10%); Curriculum Activities (10%); Lab Assignments (15%); Packet Tracer Activities (15%); Chapter Quizzes (20%); Skills-Based Exam (15%); Final Exam (15%).
Time Commitment: Semester sessions are 18-weeks long: Students must be able to spend 1 or more hours per day in the course to be successful. Summer sessions are 10 weeks long: Students must be able to spend a minimum of 2 or more hours per day, or about 90 hours during the summer, for the student to be successful in any course. Trimester sessions are 12-weeks long: Students must be able to spend 1.5 or more hours per day in the course to be successful.
Technology Requirements:
- A computer with either Windows (7 or later), Linux, Macintosh Operating System, or Chromebook. Chromebook users will need to contact their instructor to request installation of a virtual machine.
- Reliable Internet Access;
- Ability to download and install Packet Tracer, a stand-alone program that is required for all Cisco NetAcademy Courses;
- Ability to download/upload PDF files as well as Packet Tracer files (.pka);
- A PDF reader to complete assignments (Recommend: Adobe Reader); Note: All Reading Guides/Labs are fillable PDF files.
- Up to date Chrome and/or Firefox Web Browser to access the curriculum;
- Java (JRE) to access Packet Tracer testing environment;
- Students also require access to YouTube.
Please review the Michigan Virtual Technology Requirements: https://michiganvirtual.org/about/support/knowledge-base/technical-requirements/
Instructor Support System: For technical issues within your course, contact the Customer Care Center by email at [email protected] or by phone at (888) 889-2840.
Instructor Contact Expectations: Students can use email or the private message system within the Student Learning Portal to access highly qualified teachers when they need instructor assistance. Students will also receive feedback on their work inside the learning management system. The Instructor Info area of their course may describe additional communication options.
Academic Support Available: In addition to access to a highly qualified, Michigan certified teacher, students have access to academic videos and outside resources verified by Michigan Virtual. For technical issues within the course, students can contact the Michigan Virtual Customer Care by email at [email protected] or by phone at (888) 889-2840.
Required Assessment: Online assessments consist of formative and summative assessments represented by computer-graded multiple choice, instructor-graded writing assignments, including labs/lab reports, Packet Tracer Activities and Skills-Based Assessments.
Technical Skills Needed: Basic technology skills necessary to locate and share information and files as well as interact with others in a Learning Management System (LMS), include the ability to:
- Download, edit, save, convert, and upload files
- Download and install software
- Use a messaging service similar to email
- Communicate with others in online discussion or message boards, following basic rules of netiquette
- Open attachments shared in messages
- Create, save, and submit files in commonly used word processing program formats and as a PDF
- Edit file share settings in cloud-based applications, such as Google Docs, Sheets, or Slides
- Save a file as a .pdf
- Copy and paste and format text using your mouse, keyboard, or an html editor’s toolbar menu
- Insert images or links into a file or html editor
- Search for information within a document using Ctrl+F or Command+F keyboard shortcuts
- Work in multiple browser windows and tabs simultaneously
- Activate a microphone or webcam on your device, and record and upload or link audio and/or video files
- Use presentation and graphics programs
- Follow an online pacing guide or calendar of due dates
- Use spell-check, citation editors, and tools commonly provided in word processing tool menus
- Create and maintain usernames and passwords
Additional Information: Students who successfully complete each of the courses (Networking Essentials, Introduction to Cybersecurity, Cybersecurity Essentials) will receive a certificate of completion for each course.