Cybersecurity Essentials

Enrollment Message:

This course has specific, unique technology and device requirements; please see the full syllabus for details. Students will receive additional information by email about accessing their course content in NetAcad within 24 school day or business hours after their enrollment is approved in the Student Learning Portal (SLP).

Every day, Cybersecurity threats are growing in complexity and scale. In their Global Risks Report (2021) publication, even the World Economic Forum listed Cybersecurity failure among the top 5 global risks, along with threats like extreme weather and infectious diseases. At the same time, organizations everywhere seek new cybersecurity talent.
In this course, learners develop workforce readiness skills and build a foundation for success in cybersecurity-related careers. With video and rich interactive media support, participants learn, apply, and practice cybersecurity knowledge and skills through a series of in-depth, hands-on experiences and simulated activities that reinforce their learning.
Cybersecurity Essentials teaches comprehensive cybersecurity concepts and skills at the entry level, from threat mitigation and defense to post-incident forensics. Learners will progress from basic cybersecurity concepts to experiences in assessing vulnerabilities and risks later in the curriculum.
This course is offered in partnership with Michigan Information Technology Training, LLC. (MITT) Prerequisites:  None, but Networking Essentials is highly recommended.

Course Objectives: Upon completion of this course, students will be able to...

  • Explain how threat actors execute some of the most common types of cyber attacks
  • Explain network security principles
  • Explain how TCP/IP vulnerabilities enable network attacks
  • Recommend measures to mitigate threats
  • Troubleshoot a wireless network
  • Explain how devices and services are used to enhance network security
  • Use Windows administrative tools
  • Implement basic Linux security
  • Evaluate endpoint protection and the impacts of malware
  • Use cybersecurity best practices to improve confidentiality, integrity, and availability
  • Explain approaches to network security defense
  • Implement some of the various aspects of system and network defense
  • Configure local and server-based access control
  • Implement access control lists (ACLs) to filter traffic and mitigate network attacks
  • Explain how firewalls are implemented to provide network security
  • Implement Zone-Based Policy Firewall using the CLI
  • Recommend cloud security requirements based on a given cloud scenario
  • Determine the cryptographic techniques that are required to ensure confidentiality, integrity, and authenticity
  • Explain how security technologies affect security monitoring
  • Use different types of logs and records to store information regarding hosts and the network
  • Explain the process of evaluating alerts
  • Create documents and policies related to cybersecurity governance and compliance
  • Use tools for network security testing
  • Evaluate threat intelligence sources
  • Explain how endpoint vulnerabilities are assessed and managed
  • Select security controls based on risk assessment outcomes
  • Use incident response models and forensic techniques to investigate security incidents

Course Outline:

Topic 1: Network Security

Threats, Vulnerabilities and Attacks

Securing Networks

Attacking the Foundation

Attacking What We Do

Wireless Communication Devices

Networking Security Infrastructure

Topic 2: OS and Endpoint Security

Windows Operating System

Linux Overview

System and Endpoint Protection

Principles, Practices, Processes

Topic 3: Processes of Network Security

Understanding Defense

System / Network Defense

Access Control

Topic 4: Firewalls, Cryptography and Cloud Security

Access Control Lists

Firewall Technologies

Zone-Based Policy Firewalls

Cloud Security

Cryptography

Topic 5: Evaluating Security Alerts

Technologies / Protocols

Network Security Data

Evaluating Alerts

Topic 6: Vulnerability Assessment and Risk Management

Governance / Compliance

Security Assessments

Threat Intelligence

Endpoint Vulnerability Assessment

Risk Management / Security Controls

Topic 7: Incident Response

Digital Forensics / Incident Analysis

Resources Included: Students will have access to the Cisco Networking Academy (Netacad) curriculum and course resources (Labs, Packet Tracer Activities, Reading Guides, Assessments, etc.). MITT is offering the Cisco Networking Academy Program in an asynchronous e-learning environment to enable students to learn valuable information and skills for increased access to opportunities in the global economy.

Additional Costs: None

Scoring System: Michigan Virtual and MITT do not assign letter grades, grant credit for courses, nor issue diplomas. A final score out of total points earned will be submitted to your school mentor for conversion to their own letter grading system. Final course score will be based on the following categories approximations: Course Reading Guides (20%); Lab / Packet Tracer Activities (30%); Checkpoint Exams (30%); Final Exam (20%)

Time Commitment: Semester sessions are 18-weeks long: Students must be able to spend 1 or more hours per day in the course to be successful. Summer sessions are 10 weeks long: Students must be able to spend a minimum of 2 or more hours per day, or about 90 hours during the summer, for the student to be successful in any course. Trimester sessions are 12-weeks long: Students must be able to spend 1.5 or more hours per day in the course to be successful.

Technology Requirements: Students will require all of the following:

  • A computer device with either Windows (7 or later), Linux, or Macintosh operating system. NOTE: Chromebook users will need to contact their instructor to request a virtual machine.
  • Ability to download and install Packet Tracer, a stand-alone software program that is required for all Cisco Network Academy courses
  • Ability to download and upload PDF and Packet Tracer (.pka) files
  • An up-to-date Chrome or Firefox web browser with Java (JRE) enabled to access the Packet Tracer testing environment
  • A PDF reader to complete assignments (Recommended: Adobe Reader)
    • All reading guides / labs are fillable PDF files
  • Reliable internet access
  • Access to YouTube as an additional learning resource

Please review the Michigan Virtual Technology Requirements: https://michiganvirtual.org/about/support/knowledge-base/technical-requirements/

Instructor Support System: For technical issues within your course, contact the Customer Care Center by email at [email protected] or by phone at (888) 889-2840.

Instructor Contact Expectations: Students can use email or the private message system within the Student Learning Portal to access highly qualified teachers when they need instructor assistance. Students will also receive feedback on their work inside the learning management system. The Instructor Info area of their course may describe additional communication options.

Academic Support Available: In addition to access to a highly qualified, Michigan certified teacher, students have access to academic videos and outside resources verified by Michigan Virtual. For technical issues within the course, students can contact the Michigan Virtual Customer Care by email at [email protected] or by phone at (888) 889-2840.

Required Assessment: Online assessments consist of formative and summative assessments represented by computer-graded multiple choice, instructor-graded writing assignments including labs / lab reports, Packet Tracer activities and skill-based assessments.

Technical Skills Needed: Basic technology skills necessary to locate and share information and files as well as interact with others in a Learning Management System (LMS), include the ability to:

  • Download, edit, save, convert, and upload files
  • Download and install software
  • Use a messaging service similar to email
  • Communicate with others in online discussion or message boards, following basic rules of netiquette
  • Open attachments shared in messages
  • Create, save, and submit files in commonly used word processing program formats and as a PDF
  • Edit file share settings in cloud-based applications, such as Google Docs, Sheets, or Slides
  • Save a file as a .pdf
  • Copy and paste and format text using your mouse, keyboard, or an html editor’s toolbar menu
  • Insert images or links into a file or html editor
  • Search for information within a document using Ctrl+F or Command+F keyboard shortcuts
  • Work in multiple browser windows and tabs simultaneously
  • Activate a microphone or webcam on your device, and record and upload or link audio and/or video files
  • Use presentation and graphics programs
  • Follow an online pacing guide or calendar of due dates
  • Use spell-check, citation editors, and tools commonly provided in word processing tool menus
  • Create and maintain usernames and passwords

Additional Information: Students who successfully complete each of the courses will receive a certificate of completion. Students also are eligible to sit for the entry-level Cisco Certified Support Technician (CCST) Cybersecurity certification.
While Michigan Virtual and MITT assist in preparing students for this exam, the certification exam is not part of this course. It is the responsibility of the student or parent to register for the CCST exam. In addition, those taking the exam may need to engage in extra review to fully prepare.
For more information about certification exams, go to: https://learningnetwork.cisco.com/community/certifications/book-your-exam

Details


School Level: High School
Standards: Michigan Center for Career and Technical Education
NCAA Approved: N/A - Non-Core
Alignment Document: Document
Course Location:
NCES Code: 10108
MDE Endorsement Code: NR - Computer Science
MMC Minimum Requirements: EDP/Career Interest Elective

When Offered: _Internal Use Only

Content Provider: MI Information Technology Training
Instructor Provider: MI Information Technology Training

Course Type: Netacademy