Every day, Cybersecurity threats are growing in complexity and scale. In their Global Risks Report (2021) publication, even the World Economic Forum listed Cybersecurity failure among the top 5 global risks, along with threats like extreme weather and infectious diseases. At the same time, organizations everywhere seek new cybersecurity talent.
In this course, learners develop workforce readiness skills and build a foundation for success in cybersecurity-related careers. With video and rich interactive media support, participants learn, apply, and practice cybersecurity knowledge and skills through a series of in-depth, hands-on experiences and simulated activities that reinforce their learning.
Cybersecurity Essentials teaches comprehensive cybersecurity concepts and skills at the entry level, from threat mitigation and defense to post-incident forensics. Learners will progress from basic cybersecurity concepts to experiences in assessing vulnerabilities and risks later in the curriculum.
This course is offered in partnership with Michigan Information Technology Training, LLC. (MITT)
Prerequisites: None, but Networking Essentials is highly recommended.
Course Objectives: Upon completion of this course, students will be able to...
- Explain how threat actors execute some of the most common types of cyber attacks
- Explain network security principles
- Explain how TCP/IP vulnerabilities enable network attacks
- Recommend measures to mitigate threats
- Troubleshoot a wireless network
- Explain how devices and services are used to enhance network security
- Use Windows administrative tools
- Implement basic Linux security
- Evaluate endpoint protection and the impacts of malware
- Use cybersecurity best practices to improve confidentiality, integrity, and availability
- Explain approaches to network security defense
- Implement some of the various aspects of system and network defense
- Configure local and server-based access control
- Implement access control lists (ACLs) to filter traffic and mitigate network attacks
- Explain how firewalls are implemented to provide network security
- Implement Zone-Based Policy Firewall using the CLI
- Recommend cloud security requirements based on a given cloud scenario
- Determine the cryptographic techniques that are required to ensure confidentiality, integrity, and authenticity
- Explain how security technologies affect security monitoring
- Use different types of logs and records to store information regarding hosts and the network
- Explain the process of evaluating alerts
- Create documents and policies related to cybersecurity governance and compliance
- Use tools for network security testing
- Evaluate threat intelligence sources
- Explain how endpoint vulnerabilities are assessed and managed
- Select security controls based on risk assessment outcomes
- Use incident response models and forensic techniques to investigate security incidents
Course Outline:
Topic 1: Network Security
Threats, Vulnerabilities and Attacks
Securing Networks
Attacking the Foundation
Attacking What We Do
Wireless Communication Devices
Networking Security Infrastructure
Topic 2: OS and Endpoint Security
Windows Operating System
Linux Overview
System and Endpoint Protection
Principles, Practices, Processes
Topic 3: Processes of Network Security
Understanding Defense
System / Network Defense
Access Control
Topic 4: Firewalls, Cryptography and Cloud Security
Access Control Lists
Firewall Technologies
Zone-Based Policy Firewalls
Cloud Security
Cryptography
Topic 5: Evaluating Security Alerts
Technologies / Protocols
Network Security Data
Evaluating Alerts
Topic 6: Vulnerability Assessment and Risk Management
Governance / Compliance
Security Assessments
Threat Intelligence
Endpoint Vulnerability Assessment
Risk Management / Security Controls
Topic 7: Incident Response
Digital Forensics / Incident Analysis
Resources Included: Students will have access to the Cisco Networking Academy (Netacad) curriculum and course resources (Labs, Packet Tracer Activities, Reading Guides, Assessments, etc.). MITT is offering the Cisco Networking Academy Program in an asynchronous e-learning environment to enable students to learn valuable information and skills for increased access to opportunities in the global economy.
Additional Costs: None
Scoring System: Michigan Virtual and MITT do not assign letter grades, grant credit for courses, nor issue diplomas. A final score out of total points earned will be submitted to your school mentor for conversion to their own letter grading system. Final course score will be based on the following categories approximations: Course Reading Guides (20%); Lab / Packet Tracer Activities (30%); Checkpoint Exams (30%); Final Exam (20%)
Time Commitment: Semester sessions are 18-weeks long: Students must be able to spend 1 or more hours per day in the course to be successful. Summer sessions are 10 weeks long: Students must be able to spend a minimum of 2 or more hours per day, or about 90 hours during the summer, for the student to be successful in any course. Trimester sessions are 12-weeks long: Students must be able to spend 1.5 or more hours per day in the course to be successful.
Technology Requirements: Students will require all of the following:
- A computer device with either Windows (7 or later), Linux, or Macintosh operating system. NOTE: Chromebook users will need to contact their instructor to request a virtual machine.
- Ability to download and install Packet Tracer, a stand-alone software program that is required for all Cisco Network Academy courses
- Ability to download and upload PDF and Packet Tracer (.pka) files
- An up-to-date Chrome or Firefox web browser with Java (JRE) enabled to access the Packet Tracer testing environment
- A PDF reader to complete assignments (Recommended: Adobe Reader)
- All reading guides / labs are fillable PDF files
- Reliable internet access
- Access to YouTube as an additional learning resource
Please review the Michigan Virtual Technology Requirements: https://michiganvirtual.org/about/support/knowledge-base/technical-requirements/
Instructor Support System: For technical issues within your course, contact the Customer Care Center by email at [email protected] or by phone at (888) 889-2840.
Instructor Contact Expectations: Students can use email or the private message system within the Student Learning Portal to access highly qualified teachers when they need instructor assistance. Students will also receive feedback on their work inside the learning management system. The Instructor Info area of their course may describe additional communication options.
Academic Support Available: In addition to access to a highly qualified, Michigan certified teacher, students have access to academic videos and outside resources verified by Michigan Virtual. For technical issues within the course, students can contact the Michigan Virtual Customer Care by email at [email protected] or by phone at (888) 889-2840.
Required Assessment: Online assessments consist of formative and summative assessments represented by computer-graded multiple choice, instructor-graded writing assignments including labs / lab reports, Packet Tracer activities and skill-based assessments.
Technical Skills Needed: Basic technology skills necessary to locate and share information and files as well as interact with others in a Learning Management System (LMS), include the ability to:
- Download, edit, save, convert, and upload files
- Download and install software
- Use a messaging service similar to email
- Communicate with others in online discussion or message boards, following basic rules of netiquette
- Open attachments shared in messages
- Create, save, and submit files in commonly used word processing program formats and as a PDF
- Edit file share settings in cloud-based applications, such as Google Docs, Sheets, or Slides
- Save a file as a .pdf
- Copy and paste and format text using your mouse, keyboard, or an html editor’s toolbar menu
- Insert images or links into a file or html editor
- Search for information within a document using Ctrl+F or Command+F keyboard shortcuts
- Work in multiple browser windows and tabs simultaneously
- Activate a microphone or webcam on your device, and record and upload or link audio and/or video files
- Use presentation and graphics programs
- Follow an online pacing guide or calendar of due dates
- Use spell-check, citation editors, and tools commonly provided in word processing tool menus
- Create and maintain usernames and passwords
Additional Information: Students who successfully complete each of the courses will receive a certificate of completion. Students also are eligible to sit for the entry-level Cisco Certified Support Technician (CCST) Cybersecurity certification.
While Michigan Virtual and MITT assist in preparing students for this exam, the certification exam is not part of this course. It is the responsibility of the student or parent to register for the CCST exam. In addition, those taking the exam may need to engage in extra review to fully prepare.
For more information about certification exams, go to: https://learningnetwork.cisco.com/community/certifications/book-your-exam