Cyber Network Security Syllabus and Outline
Cyber Network Security Syllabus and Outline
Course Description:
In the Cyber Network Security course, students will get an overview of key principles of
cybersecurity and learn about different threats, regulations, and cybersecurity ethical
considerations. The course will cover fundamental knowledge of the incident response
process and business continuity planning. Students will also learn about malware, common
attack vectors, and learn to use Windows firewall.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
This course is broken up into two different categories with several sections within each
category. The idea is to start at the bottom of the pyramid and work your way to the top. The
dark gray section is the Information Category. It sits at the bottom because you need a strong
base of cybersecurity knowledge to effectively perform cybersecurity operations. The lighter
gray section is the Application of Information Category. This category is where the theoretical
information learned in the Information Category is put into practice. The Application of
Information Category sits at the top because you need a strong foundation of knowledge to
build your way up to performing security actions, and because it takes a large amount of
information to perform ordinary actions. The breakdown of these two categories are as
follows:
Information: The information category breaks down into the following sections:
● Core Knowledge: This section is dedicated to giving a broad overview of IT and cyber
security principles, cyber threats and vulnerabilities, and how policies and ethics
define the boundaries between the good and the bad.
● Knowledge of Applications: This section is to give an overview of specific network
security aspects by providing rules and procedures associated with these topics.
Sections include proper handling of data, the risk management process, information
classification and compromise, and the consequences of lapses in cyber security
● Design Knowledge: This section focuses on the knowledge of properly building a
network and sustaining its integrity using secure architecture concepts and security
models. This section also looks at common attack vectors and how a properly built
network can neutralize many of them.
● Design Skills: This section builds on the Application and Design sections in the
Information Category. This section looks at implementing, maintaining, and improving
established network security practices. This section also walks a user through
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
protecting a network against malware by applying good network designs learning in
the Information Category.
● Device Skills: This section looks at configuring computer and network protection
components and how a firm relationship between components can result in strong
network security.
Prerequisites: This course is designed for beginners who have little or no knowledge of
network security but do have knowledge in basic network concepts. It will be assumed that
the learners of this course have a firm basis in network terminology, an understanding of
protocols and hardware devices, and a general idea of how information is sent through the
network from one place to another. It is preferred the learners take the Network Concepts and
Network Infrastructure sections of this course before moving on to this section.
Course Goals: By the end of this course, students should be able to:
● Know and explain the foundational principles of cybersecurity and how everything
done in network security can be traced back to those principles
● Understand the dangers which networks face every day
● Handle data, risk, and informational assets in a secure manner and know why these are
critical applications
● Look at a network architecture and determine if the network is secure
● Understand how staying up to date in network security practices makes network
security a lot easier
● Demonstrate abilities in securing hardware components to protect networks
● Be aware of why all parts of network security relate to each other and be aware of the
consequences when there is a breakdown between the parts
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Course Outline
Module 1 | Introduction
Lesson 1.1: Course Overview and Introduction (8:41)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Lesson 6.2: Using Network Protection Components (11:36)
Lesson 6.3: Windows Firewall Demo Part1 (13:19)
Lesson 6.4: Windows Firewall Demo Part2 (8:34)
Lesson 6.5 Module Conclusion and Review (7:40)
Module 7 | Conclusion
Lesson 7.1: Conclusion and Summary (2:47)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5