Cybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information.
Cybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information. Organizations, such as the government maintain a huge amount of confidential information, including intellectual property and critical infrastructures.
These infrastructures and information require protection from the prying eyes of cyber intruders and other actors. In order to be part of a team that is responsible for providing this protection, you need the appropriate training and certification first. This class will help you to acquire those fundamental skills.
Course Outline
Threats, Attacks and Vulnerabilities - Introduces students to various types of threats, attacks and vulnerabilities, including: malware, social engineering, application/service and wireless attacks. Students will also be introduced to threat vectors and their attributes, as well as penetration testing concepts.
Technologies and Tools - Students will learn how to install, configure, and deploy network components, including firewall, virtual private network, intrusion detection/prevention systems, routers, proxies, protocol analyzers, network scanners, etc. Students will also learn how to troubleshoot common security issues, implement secure protocols, as well as analyze and interpret output from security technologies.
Architecture and Design - The instructor will explain how to implement secure network architecture, including DMZ, NAT, intranet, VPN and VLAN. Students will also learn how to secure systems design, such as Trusted Platform Module and secure boot, as well as secure application development and deployment concepts. This module will also introduce students to the cloud and virtualization concepts, such as hypervisor and security as a service.
Identity and Access Management - Introduce students to identity and access management concepts. Students will learn how to install and configure identity and access services, such as Kerberos, CHAP and RADIUS. They will also learn how to implement identity and access controls, such as biometrics and tokens.
Risk Management - Learn concepts of policies, plans and procedures relative to organizational security. Students will learn risk assessment concepts, incident response procedures, disaster recovery and business continuity concepts.
Data Security and Privacy Practices - The instructor will explain various data security and privacy practices, including shredding and wiping. Students will review data sensitivity labeling and handling concepts, such as confidentiality and private.
Cryptography and PKI - Learn cryptography concepts, such as symmetric algorithms, hashing, key exchange, obfuscation, stream and block. Students will also learn how to install and configure wireless security settings, as well as implement public key infrastructure.
Welcome to Community College of Philadelphia, a public, open-admission institution that provides both academic resources and support services to help students achieve their academic goals. As the largest public institution of higher education in Philadelphia, the College has served more than 685,000 of the city's residents since 1965.
Mission Statement
Community College of Philadelphia is an open-admission, associate-degree-granting institution which provides access to higher education for all who may benefit. Its programs of study in the liberal arts and sciences, career technologies, and basic academic skills provide a coherent foundation for college transfer, employment and lifelong learning.
The College serves Philadelphia by preparing its students to be informed and concerned citizens, active participants in the cultural life of the city, and enabled to meet the changing needs of business, industry and the professions.
To help address broad economic, cultural and political concerns in the city and beyond, the College draws together students from a wide range of ages and backgrounds and seeks to provide the programs and support they need to achieve their goals.
The College seeks to create a caring environment which is intellectually and culturally dynamic and encourages all students to achieve:
To serve Philadelphia as a premier learning institution where student success exemplifies the strength of a diverse, urban community college.
The College places fairness and honesty at the center of all of its policies and operations. We uphold the highest ethical standards in striving for academic and professional integrity in all that we do. We strive to be both responsible and responsive in utilizing resources to meet student and community needs.
The College sets, expects and maintains high educational standards consistent with the needs of the students, region and changing workforce. Our faculty and staff are committed to providing high-quality, innovative, and flexible educational opportunities and services in an accessible, student-centered environment.
The College embraces and understands the importance of providing an education and environment that promotes the uniqueness of students, faculty, staff and the communities that we serve.
We affirm that diversity is crucial to a democratic society, as it enriches the educational experience and celebrates differences among individuals.
The College functions as a learning organization, continually adapting, improving and evaluating its services to promote lifelong intellectual and personal development.
We believe that learning is rooted in both curiosity and inquiry, and is engendered by dedicated, creative and enthusiastic teaching which utilizes appropriate, optimal modes of delivery. Technology supports and serves the learning process.
The College is committed to effective, open and proactive communication. We take responsibility to listen, speak and write clearly to inform others and foster collaboration by using and respecting a matrix of communication channels. Collaborative partnerships are strengthened when communication is ongoing and productive.
Respect
The College promotes respect, civility and courtesy in our day-to-day interactions with others. We seek to instill respect for and appreciation of members of the College community, our facilities, our environment, our community and the institution in which we work.
This official ISACA CGEIT certification course prepares you for the exam to become Certified in the Governance of Enterprise IT. It provides you with in-depth coverage on the GEIT Framework.
ain Marketable Skills to Succeed in the Field Accelerated, Practical Cybersecurity Training Develop the advanced skills you’ll need from day one on the job by training on the cybersecurity industry’s top tools and software.
Learn how Python can be used to automate security processes, execute system administration tasks, and solve common IT problems.
While information has become more easily accessible and readily available, the associated risks and security threats have not only increased in number but also complexity.
The importance of cybersecurity today cannot be overstated, which makes it a good time to join a cybersecurity bootcamp. As our reliance on technology grows, there’s a corresponding need to secure and defend networks and data against leaks, theft, and attacks.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy