Networking and Cybersecurity Essentials

Enrollment Message:

This course has specific, unique technology and device requirements; please see the full syllabus for details. Students will receive additional information by email about accessing their course content in NetAcad within 24 school day or business hours after their enrollment is approved in the Student Learning Portal (SLP).

Computer Networking and Cybersecurity are the heart of the digital transformation. Often unseen, networks enable us to stay connected as we move around freely using our laptop or smartphone. This interconnected world makes everyone more susceptible to cyber-attacks. A single breach can have huge consequences for a company’s ability to function, hurting the bottom line and causing disruption in the daily lives of millions of people.

Networking and Cybersecurity Essentials is a combination of Networking Essentials, Introduction to Cybersecurity and Cybersecurity Essentials courses offered in partnership with Michigan Information Technology Training. The course begins with the basic network concepts to help you set up a SOHO (small-office/home-office) network and put you on the path to managing a larger-scale business network. You will explore cyber trends, threats and the broader topic of cybersecurity in a way that will matter to YOU. This course will help you develop an understanding of cybercrime, security principles, technologies, and procedures to defend networks.

This course is offered in partnership with Michigan Information Technology Training. Prerequisites: None

Course Objectives: Upon completion of this course, students will be able to...

  • Explain how end-user devices and local networks interact with the global Internet.
  • Explain the requirements for network connectivity.
  • Build a small network using an integrated network router.
  • Explain the importance of IP addressing.
  • Explain how the protocols of the TCP/IP suite enable network communication.
  • Configure an integrated wireless router and wireless clients to connect securely to the Internet.
  • Configure basic network security.
  • Build a simple computer network using Cisco devices.
  • Troubleshoot common network issues found in home and small business networks.
  • Explain the need and importance of cybersecurity.
  • Explain the characteristics and value of personal data, and data within an organization.
  • Recognize the characteristics and operation of a cyber attack.
  • Interpret the trends in the cyber threat landscape.
  • Understand how to protect devices from threats.
  • Master how to safeguard your privacy.
  • Learn techniques to protect organizations from cyber attacks.
  • Recognize the behavior-based approach to cybersecurity.
  • Understand legal and ethical issues in cybersecurity.
  • Explain the opportunities for pursuing an education and a career in cybersecurity.
  • Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
  • Describe the tactics, techniques and procedures used by cyber criminals.
  • Describe how technologies, products, and procedures are used to protect confidentiality.
  • Describe how technologies, products, and procedures are used to ensure integrity.
  • Describe how technologies, products, and procedures provide high availability.
  • Explain how cybersecurity professionals use technologies, processes, and procedures to defend all components of the network.
  • Explain the purpose of laws related to cybersecurity.

Course Outline:

Segment 1: Networking Essentials

Communications in a Connected World

Online Communications

Explore Networks

Peer to Peer Networks

Providing Network Services

Communications Principles

Network Design

Routing

Internet Protocol

Dynamic Addressing (DHCP)

IP Addressing

Transport Services

Build a Home Network

Security Considerations

Cisco Switches and Routers

Segment 2: Introduction to Cybersecurity

The Need for Cybersecurity

Attacks, Concepts, Techniques

Protecting Your Data and Privacy

Protecting the Organization

Your Future in Cybersecurity

Segment 3: Cybersecurity Essentials

Cybersecurity Experts or Criminals

The Cybersecurity Cube

Threats, Vulnerabilities, Attacks

The Art of Protecting Secrets

The Art of Ensuring Integrity

The Five Nines Concept

Protecting a Cybersecurity Domain

Becoming a Cybersecurity Specialist

Resources Included: Students will have access to the Cisco Networking Academy (Netacad) curriculum and course resources (Labs, Packet Tracer Activities, Reading Guides, Assessments, etc.). Michigan Information Technology Training is a Cisco Networking Academy and is offering the Cisco Netacademy Program in an asynchronous e-learning environment to enable students to learn valuable information and skills for increased access to opportunities in the global economy.

Additional Costs: None

Scoring System: Michigan Virtual and Michigan Information Technology Training do not assign letter grades, grant credit for courses, nor issue diplomas. A final score earned will be submitted to your school mentor for conversion to their own letter grading system. The final score will be calculated through total points earned within the following weighted categories: Chapter Reading Guides (10%); Curriculum Activities (10%); Lab Assignments (15%); Packet Tracer Activities (15%); Chapter Quizzes (20%); Skills-Based Exam (15%); Final Exam (15%).

Time Commitment: Semester sessions are 18-weeks long: Students must be able to spend 1 or more hours per day in the course to be successful. Summer sessions are 10 weeks long: Students must be able to spend a minimum of 2 or more hours per day, or about 90 hours during the summer, for the student to be successful in any course. Trimester sessions are 12-weeks long: Students must be able to spend 1.5 or more hours per day in the course to be successful.

Technology Requirements:

  • A computer with either Windows (7 or later), Linux, Macintosh Operating System, or Chromebook. Chromebook users will need to contact their instructor to request installation of a virtual machine.
  • Reliable Internet Access;
  • Ability to download and install Packet Tracer, a stand-alone program that is required for all Cisco NetAcademy Courses;
  • Ability to download/upload PDF files as well as Packet Tracer files (.pka);
  • A PDF reader to complete assignments (Recommend: Adobe Reader); Note: All Reading Guides/Labs are fillable PDF files.
  • Up to date Chrome and/or Firefox Web Browser to access the curriculum;
  • Java (JRE) to access Packet Tracer testing environment;
  • Students also require access to YouTube.

Please review the Michigan Virtual Technology Requirements: https://michiganvirtual.org/about/support/knowledge-base/technical-requirements/ 

Instructor Support System: For technical issues within your course, contact the Customer Care Center by email at [email protected] or by phone at (888) 889-2840.

Instructor Contact Expectations: Students can use email or the private message system within the Student Learning Portal to access highly qualified teachers when they need instructor assistance. Students will also receive feedback on their work inside the learning management system. The Instructor Info area of their course may describe additional communication options.

Academic Support Available: In addition to access to a highly qualified, Michigan certified teacher, students have access to academic videos and outside resources verified by Michigan Virtual. For technical issues within the course, students can contact the Michigan Virtual Customer Care by email at [email protected] or by phone at (888) 889-2840.

Required Assessment: Online assessments consist of formative and summative assessments represented by computer-graded multiple choice, instructor-graded writing assignments, including labs/lab reports, Packet Tracer Activities and Skills-Based Assessments.

Technical Skills Needed: Basic technology skills necessary to locate and share information and files as well as interact with others in a Learning Management System (LMS), include the ability to:

  • Download, edit, save, convert, and upload files
  • Download and install software
  • Use a messaging service similar to email
  • Communicate with others in online discussion or message boards, following basic rules of netiquette
  • Open attachments shared in messages
  • Create, save, and submit files in commonly used word processing program formats and as a PDF
  • Edit file share settings in cloud-based applications, such as Google Docs, Sheets, or Slides
  • Save a file as a .pdf
  • Copy and paste and format text using your mouse, keyboard, or an html editor’s toolbar menu
  • Insert images or links into a file or html editor
  • Search for information within a document using Ctrl+F or Command+F keyboard shortcuts
  • Work in multiple browser windows and tabs simultaneously
  • Activate a microphone or webcam on your device, and record and upload or link audio and/or video files
  • Use presentation and graphics programs
  • Follow an online pacing guide or calendar of due dates
  • Use spell-check, citation editors, and tools commonly provided in word processing tool menus
  • Create and maintain usernames and passwords

Additional Information: Students who successfully complete each of the courses (Networking Essentials, Introduction to Cybersecurity, Cybersecurity Essentials) will receive a certificate of completion for each course.

Details


School Level: High School
Standards: Michigan Center for Career and Technical Education
NCAA Approved: N/A - Non-Core
Alignment Document: Document
Course Location:
NCES Code: 10101
MDE Endorsement Code: NR - Computer Science
MMC Minimum Requirements: EDP/Career Interest Elective

When Offered: _Internal Use Only

Content Provider: MI Information Technology Training
Instructor Provider: MI Information Technology Training

Course Type: Netacademy