0% found this document useful (0 votes)
97 views5 pages

Cyber Network Security Syllabus and Outline

This course syllabus outlines a Cyber Network Security course that covers core cybersecurity principles and their practical application. The course is broken into two main categories: Information, providing a knowledge base of topics like threats and regulations; and Application of Information, where students implement designs and use security components. Over seven modules and 27 lessons, students learn about incident response, malware, firewall usage and more, with the goal of explaining cybersecurity foundations and securing network architecture.

Uploaded by

s.hakim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views5 pages

Cyber Network Security Syllabus and Outline

This course syllabus outlines a Cyber Network Security course that covers core cybersecurity principles and their practical application. The course is broken into two main categories: Information, providing a knowledge base of topics like threats and regulations; and Application of Information, where students implement designs and use security components. Over seven modules and 27 lessons, students learn about incident response, malware, firewall usage and more, with the goal of explaining cybersecurity foundations and securing network architecture.

Uploaded by

s.hakim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Course Syllabus

Cyber Network Security

Instructor Name​: Peter Cipolone Course Creation Date: 9/23/2019

Instructor Contact​: [email protected]

Course Description and Goals

Course Description:

In the Cyber Network Security course, students will get an overview of key principles of
cybersecurity and learn about different threats, regulations, and cybersecurity ethical
considerations. The course will cover fundamental knowledge of the incident response
process and business continuity planning. Students will also learn about malware, common
attack vectors, and learn to use Windows firewall.

Brought to you by: Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
​1
This course is broken up into two different categories with several sections within each
category. The idea is to start at the bottom of the pyramid and work your way to the top. The
dark gray section is the Information Category. It sits at the bottom because you need a strong
base of cybersecurity knowledge to effectively perform cybersecurity operations. The lighter
gray section is the Application of Information Category. This category is where the theoretical
information learned in the Information Category is put into practice. The Application of
Information Category sits at the top because you need a strong foundation of knowledge to
build your way up to performing security actions, and because it takes a large amount of
information to perform ordinary actions. The breakdown of these two categories are as
follows:

Information​: The information category breaks down into the following sections:

● Core Knowledge​: This section is dedicated to giving a broad overview of IT and cyber
security principles, cyber threats and vulnerabilities, and how policies and ethics
define the boundaries between the good and the bad.
● Knowledge of Applications​: This section is to give an overview of specific network
security aspects by providing rules and procedures associated with these topics.
Sections include proper handling of data, the risk management process, information
classification and compromise, and the consequences of lapses in cyber security
● Design Knowledge​: This section focuses on the knowledge of properly building a
network and sustaining its integrity using secure architecture concepts and security
models. This section also looks at common attack vectors and how a properly built
network can neutralize many of them.

Application of Information​: The Application of Information category breaks down into


the following sections:

● Design Skills​: This section builds on the Application and Design sections in the
Information Category. This section looks at implementing, maintaining, and improving
established network security practices. This section also walks a user through

Brought to you by: Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2​
protecting a network against malware by applying good network designs learning in
the Information Category.
● Device Skills​: This section looks at configuring computer and network protection
components and how a firm relationship between components can result in strong
network security.

Prerequisites: ​This course is designed for beginners who have little or no knowledge of
network security but do have knowledge in basic network concepts. It will be assumed that
the learners of this course have a firm basis in network terminology, an understanding of
protocols and hardware devices, and a general idea of how information is sent through the
network from one place to another. It is preferred the learners take the Network Concepts and
Network Infrastructure sections of this course before moving on to this section.

Course Goals: ​By the end of this course, students should be able to:

● Know and explain the foundational principles of cybersecurity and how everything
done in network security can be traced back to those principles
● Understand the dangers which networks face every day
● Handle data, risk, and informational assets in a secure manner and know why these are
critical applications
● Look at a network architecture and determine if the network is secure
● Understand how staying up to date in network security practices makes network
security a lot easier
● Demonstrate abilities in securing hardware components to protect networks
● Be aware of why all parts of network security relate to each other and be aware of the
consequences when there is a breakdown between the parts

Brought to you by: Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3​
Course Outline

Module 1​ | Introduction
Lesson 1.1: Course Overview and Introduction (8:41)

Module 2​ | Core Knowledge


Lesson 2.1 The Pillars of Cybersecurity (12:32)
Lesson 2.2: Key Principles of Cybersecurity (9:06)
Lesson 2.3: Threats, Regulations, and Ethics of Cybersecurity (8:13)
Lesson 2.4: Module Conclusion and Review (4:14)

Module 3​ | Knowledge of Applications


Lesson 3.1: Data Leakage Prevention (8:36)
Lesson 3.2: Incident Response Processes, Teams, and Policies (12:25)
Lesson 3.3: Disaster Recovery and Business Continuity (9:30)
Lesson 3.4: Module Conclusion and Review (6:10)

Module 4​ | Design Knowledge


Lesson 4.1: Network Structure Part 1 (9:14)
Lesson 4.1: Network Structure Part 2 (11:26)
Lesson 4.2: Network Architecture Models (6:15)
Lesson 4.3: Common Attack Vectors and Defense Strategies (8:01)
Lesson 4.4 Module Conclusion and Review (5:00)

Module 5​ | The Application of Designs


Lesson 5.1: Malware and Cyber Awareness (14:36)
Lesson 5.2: Maintaining and Improving Network Security Practices (10:00)
Lesson 5.3 Module Conclusion and Review (3:39)

Module 6​ | The Application of Network Devices


Lesson 6.1: Using Computer Protection Components (10:27)

Brought to you by: Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4​
Lesson 6.2: Using Network Protection Components (11:36)
Lesson 6.3: Windows Firewall Demo Part1 (13:19)
Lesson 6.4: Windows Firewall Demo Part2 (8:34)
Lesson 6.5 Module Conclusion and Review (7:40)

Module 7​ | Conclusion
Lesson 7.1: Conclusion and Summary (2:47)

Brought to you by: Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5​

You might also like