SlideShare a Scribd company logo
1 of 16
December 2017
Introduction to Cybersecurity 2.1
Overview
2
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A report from Frost & Sullivan
and (ISC)2 found that the global
cybersecurity workforce will
have more than 1.5 million
unfilled positions by 2020.
Everyone Needs to
Know
Skill Shortage Hot Jobs
Why Cybersecurity?
Even the grandmas on Facebook
need to know and practice basic
security hygiene, because what
happens everywhere on the Internet
can eventually affect us all.
10 IT skills that Employers need in
2017 – cybersecurity is rated top 3
skills that will be in high demand for
2017. Average salary for entry level
jobs range from US$64k-$113k p.a.
Source: CIO from IDG , Indeed.com
Source: report
Source: Why Cybersecurity Starts at Home
3
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Networking Academy Learning Portfolio
Collaborate for Impact
* Available within 12 months
October 2017
Aligns to Certification
Mobility Fundamentals
CCNA R&S: Introduction to Networks, R&S
Essentials, Scaling Networks, Connecting
Networks
CCNP R&S: Switch, Route, TShoot
Introduction to Cybersecurity
Introduction to IoT
CCNA Security
Cybersecurity Essentials
CCNA Cyber Ops*
Exploratory Foundational Career-Ready
Networking Essentials
Networking
Security
IoT & Analytics
Be Your Own Boss Entrepreneurship
Business
Get Connected
Digital Literacy
NDG Linux Unhatched
NDG Linux Essentials
IT Essentials
Programming
OS & IT
CLP: Advanced Programming in C*
CPP: Advanced Programming in C++
NDG Linux II
Current & Planned
CLA: Programming Essentials in C
CPA: Programming Essentials in C++
NDG Linux I
Emerging Tech Workshop: Experimenting
with REST APIs Using Cisco Spark*
IoT Fundamentals:
Connecting Things, Big Data & Analytics
Hackathon Playbook, IoT Security*
Instructor Training required
Emerging Tech Workshop: Network
Programmability Using Cisco APIC-EM*
Self-paced
PCA: Programming Essentials in Python*
Internships
Prototyping Lab
Hackathons
Packet
Tracer
Introduction to
Packet Tracer
4
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Target Audience: Secondary and 2-Year college students, general
audience
Prerequisites: None
Instructor Training Required: No
Languages: Chinese-S, English (2.1), French, German, Hebrew,
Italian, Japanese, Spanish, Portuguese
Course Delivery: Instructor-led or Self-paced
Estimated Time to Complete: 15 hours
Features
The Introduction to Cybersecurity course explores cyber trends,
threats and staying safe in cyberspace, and protecting personal
and company data.
Course Overview
Learn how to protect your personal data and privacy online and in
social media, and why more and more IT jobs require
cybersecurity awareness and understanding.
Benefits
• 5 modules
• Interactive and instructional content
• 8 Activities and 7 lab exercises that reinforce learning
• 4 quizzes and 1 final exam
• Links to related resources
Learning Components
Introduction
to Cybersecurity
5
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Minor content updates
• Recent security breach example
• Add newly discovered wireless networks security
vulnerability – KRACK
• Update NIST standard for password
• Improve course structure caters to public audience
• Remove irrelevant content and terminologies
• Simplifies certification references
• Improved Accessibility compliant to WCAG 2.0
• Bug fixes and link refreshes
• Refer to Release Notes for details
What’s Changed In 2.1?
6
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Course Outline
Chapter Chapter Titles Summary Description
1 The Need for Cybersecurity
• Learn the need for and importance of cybersecurity.
• Understand the characteristics and value of personal data, and data
within an organization.
2 Attacks, Concepts and
Techniques
• Recognize the characteristics and operation of a cyber attack.
• Interpret the trends in the cyber threat landscape.
3 Protecting Your Data and Privacy
• Understand how to protect devices from threats.
• Master how to safeguard your privacy.
4 Protecting the Organization
• Learn techniques to protect organizations from cyber attacks.
• Recognize the behavior-based approach to cybersecurity.
• Explain Cisco’s approach to cybersecurity.
5 Will Your Future Be in
Cybersecurity?
• Understand legal and ethical issues in cybersecurity
• Explore the opportunities for pursuing an education and a career in
cybersecurity.
7
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 1: The Need for Cybersecurity
Learn what cybersecurity is and why the
demand for cybersecurity professionals is
growing.
Module 1 presents:
• What your online identity and data is,
where it is, and why it is of interest to
cyber criminals.
• What organizational data is, and why it
must be protected.
• What cyber warfare is and why
organizations, nations, and governments
need cybersecurity professionals to
protect their citizens and infrastructure.
8
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 2: Attacks, Concepts and Techniques
Learn how a cybersecurity professional
analyzes a cyberattack.
Module 2 details:
• Security vulnerabilities and the different
types of vulnerabilities and malware.
• The techniques used by attackers to
infiltrate a system.
• The characteristics and operation of a
cyber attack.
• The trends in the cyber threat landscape.
9
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 3: Protecting Your Data and Privacy
Become aware of your personal devices and
data.
Module 3 covers:
• Tips for protecting your personal devices
and data by creating strong passwords
and using wireless networks safely.
• Authentication techniques helping you
maintain your data securely with tips
about what to do and what not to do
online.
• Protecting devices from threats.
• Safeguarding your privacy.
10
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 4: Protecting The Organization
Learn about the technologies, processes, and
best practices used when protecting an
organization’s network.
Module 4 presents:
• Equipment, data, and the commonly used
security terms such as botnets, the kill chain,
and behavior-based security.
• Cisco’s approach to cybersecurity using a
CSIRT team and a security playbook.
• Techniques for protecting organizations from
cyber attacks.
• The behavior-based approach to cybersecurity.
• Cisco’s approach to cybersecurity.
11
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module :5 Will Your Future Be in
Cybersecurity?
Explore educational paths towards
certifications with the Cisco Networking
Academy (NetAcad).
Module 5 summarizes:
• Understand legal and ethical Issues
in Cybersecurity
• Explore the opportunities for
pursuing an education and a career
in cybersecurity.
12
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Visit the Course information page on Cisco
NetAcad.com to enroll in the self-paced course.
If you need assistance, post questions on the Cisco
Networking Academy Facebook page
Students Enrollment and Support
13
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enroll students and teach Introduction to Cybersecurity
in their classrooms through the same process used for
other NetAcad courses
No instructor training required
If you need assistance, contact your Academy Support
Center (ASC)
Instructors Enrollment and Support
14
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Instructor Resources
PPT
Instructor Powerpoints,
Intro to Cyber security
2.1 Overview and Video
FAQ
Frequently Asked
Questions
S&S
Scope & Sequence
Document
Plus
Additional information &
resources
https://www.netacad.com/group/resources/cybersecurity/2.1
15
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
End-of-Life for Introduction to Cybersecurity 2.0
Course Language Last Class Start Date
Introduction to Cybersecurity 2.0 English April 1, 2018
All other available languages are not EOL.
Introduction to Cybersecurity v2.1 - Course Overview.pptx

More Related Content

Similar to Introduction to Cybersecurity v2.1 - Course Overview.pptx

IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptxIoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptxAurelia JQ
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...Nur Shiqim Chok
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad JanuarySkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxSkillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
 

Similar to Introduction to Cybersecurity v2.1 - Course Overview.pptx (20)

IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptxIoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 

Introduction to Cybersecurity v2.1 - Course Overview.pptx

  • 1. December 2017 Introduction to Cybersecurity 2.1 Overview
  • 2. 2 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A report from Frost & Sullivan and (ISC)2 found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. Everyone Needs to Know Skill Shortage Hot Jobs Why Cybersecurity? Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens everywhere on the Internet can eventually affect us all. 10 IT skills that Employers need in 2017 – cybersecurity is rated top 3 skills that will be in high demand for 2017. Average salary for entry level jobs range from US$64k-$113k p.a. Source: CIO from IDG , Indeed.com Source: report Source: Why Cybersecurity Starts at Home
  • 3. 3 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Networking Academy Learning Portfolio Collaborate for Impact * Available within 12 months October 2017 Aligns to Certification Mobility Fundamentals CCNA R&S: Introduction to Networks, R&S Essentials, Scaling Networks, Connecting Networks CCNP R&S: Switch, Route, TShoot Introduction to Cybersecurity Introduction to IoT CCNA Security Cybersecurity Essentials CCNA Cyber Ops* Exploratory Foundational Career-Ready Networking Essentials Networking Security IoT & Analytics Be Your Own Boss Entrepreneurship Business Get Connected Digital Literacy NDG Linux Unhatched NDG Linux Essentials IT Essentials Programming OS & IT CLP: Advanced Programming in C* CPP: Advanced Programming in C++ NDG Linux II Current & Planned CLA: Programming Essentials in C CPA: Programming Essentials in C++ NDG Linux I Emerging Tech Workshop: Experimenting with REST APIs Using Cisco Spark* IoT Fundamentals: Connecting Things, Big Data & Analytics Hackathon Playbook, IoT Security* Instructor Training required Emerging Tech Workshop: Network Programmability Using Cisco APIC-EM* Self-paced PCA: Programming Essentials in Python* Internships Prototyping Lab Hackathons Packet Tracer Introduction to Packet Tracer
  • 4. 4 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Target Audience: Secondary and 2-Year college students, general audience Prerequisites: None Instructor Training Required: No Languages: Chinese-S, English (2.1), French, German, Hebrew, Italian, Japanese, Spanish, Portuguese Course Delivery: Instructor-led or Self-paced Estimated Time to Complete: 15 hours Features The Introduction to Cybersecurity course explores cyber trends, threats and staying safe in cyberspace, and protecting personal and company data. Course Overview Learn how to protect your personal data and privacy online and in social media, and why more and more IT jobs require cybersecurity awareness and understanding. Benefits • 5 modules • Interactive and instructional content • 8 Activities and 7 lab exercises that reinforce learning • 4 quizzes and 1 final exam • Links to related resources Learning Components Introduction to Cybersecurity
  • 5. 5 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Minor content updates • Recent security breach example • Add newly discovered wireless networks security vulnerability – KRACK • Update NIST standard for password • Improve course structure caters to public audience • Remove irrelevant content and terminologies • Simplifies certification references • Improved Accessibility compliant to WCAG 2.0 • Bug fixes and link refreshes • Refer to Release Notes for details What’s Changed In 2.1?
  • 6. 6 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Course Outline Chapter Chapter Titles Summary Description 1 The Need for Cybersecurity • Learn the need for and importance of cybersecurity. • Understand the characteristics and value of personal data, and data within an organization. 2 Attacks, Concepts and Techniques • Recognize the characteristics and operation of a cyber attack. • Interpret the trends in the cyber threat landscape. 3 Protecting Your Data and Privacy • Understand how to protect devices from threats. • Master how to safeguard your privacy. 4 Protecting the Organization • Learn techniques to protect organizations from cyber attacks. • Recognize the behavior-based approach to cybersecurity. • Explain Cisco’s approach to cybersecurity. 5 Will Your Future Be in Cybersecurity? • Understand legal and ethical issues in cybersecurity • Explore the opportunities for pursuing an education and a career in cybersecurity.
  • 7. 7 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 1: The Need for Cybersecurity Learn what cybersecurity is and why the demand for cybersecurity professionals is growing. Module 1 presents: • What your online identity and data is, where it is, and why it is of interest to cyber criminals. • What organizational data is, and why it must be protected. • What cyber warfare is and why organizations, nations, and governments need cybersecurity professionals to protect their citizens and infrastructure.
  • 8. 8 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 2: Attacks, Concepts and Techniques Learn how a cybersecurity professional analyzes a cyberattack. Module 2 details: • Security vulnerabilities and the different types of vulnerabilities and malware. • The techniques used by attackers to infiltrate a system. • The characteristics and operation of a cyber attack. • The trends in the cyber threat landscape.
  • 9. 9 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 3: Protecting Your Data and Privacy Become aware of your personal devices and data. Module 3 covers: • Tips for protecting your personal devices and data by creating strong passwords and using wireless networks safely. • Authentication techniques helping you maintain your data securely with tips about what to do and what not to do online. • Protecting devices from threats. • Safeguarding your privacy.
  • 10. 10 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 4: Protecting The Organization Learn about the technologies, processes, and best practices used when protecting an organization’s network. Module 4 presents: • Equipment, data, and the commonly used security terms such as botnets, the kill chain, and behavior-based security. • Cisco’s approach to cybersecurity using a CSIRT team and a security playbook. • Techniques for protecting organizations from cyber attacks. • The behavior-based approach to cybersecurity. • Cisco’s approach to cybersecurity.
  • 11. 11 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module :5 Will Your Future Be in Cybersecurity? Explore educational paths towards certifications with the Cisco Networking Academy (NetAcad). Module 5 summarizes: • Understand legal and ethical Issues in Cybersecurity • Explore the opportunities for pursuing an education and a career in cybersecurity.
  • 12. 12 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Visit the Course information page on Cisco NetAcad.com to enroll in the self-paced course. If you need assistance, post questions on the Cisco Networking Academy Facebook page Students Enrollment and Support
  • 13. 13 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Enroll students and teach Introduction to Cybersecurity in their classrooms through the same process used for other NetAcad courses No instructor training required If you need assistance, contact your Academy Support Center (ASC) Instructors Enrollment and Support
  • 14. 14 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Instructor Resources PPT Instructor Powerpoints, Intro to Cyber security 2.1 Overview and Video FAQ Frequently Asked Questions S&S Scope & Sequence Document Plus Additional information & resources https://www.netacad.com/group/resources/cybersecurity/2.1
  • 15. 15 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential End-of-Life for Introduction to Cybersecurity 2.0 Course Language Last Class Start Date Introduction to Cybersecurity 2.0 English April 1, 2018 All other available languages are not EOL.

Editor's Notes

  1. Firstly, Why is Security Hot? We have been hearing news of security breaches and attacks happening to both small and large organizations, including government agencies. It is almost a regular occurrence. The need for infosec and network security skills, and the resulting opportunities are tremendous. You can read in the slide; the hugh demand and job opportunities for security professionals in the market .
  2. In addition to traditional course offerings, the academy provides Collaborate for Impact events, tools, and opportunities Collaborate for Impact are check-point experiences within the Foundational and Career-Ready offerings, but also independent events and offerings that serve to synthesize all skills learned to date in a problem-solving context.
  3. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  4. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  5. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  6. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  7. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  8. Given the prevalence of security breeches in the news, it is easy to understand why security is a high demand job family. Our security portfolio develops students that understand security concepts, processes and tools from the edge to the core of the network.