SlideShare a Scribd company logo
1 of 1
Download to read offline
Corporate
Social
Responsibility
Cisco Networking Academy
Certificate of Course Completion
Introduction to Cybersecurity
For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and demonstrating the ability to explain the
following:
Global implications of cyber threats
Ways in which networks are vulnerable to attack
Impact of cyber-attacks on industries
Cisco’s approach to threat detection and defense
Why cybersecurity is a growing profession
Opportunities available for pursuing network security certifications
Laura Quintana
VP & General Manager, Cisco Networking Academy
Angelo Settembre
Student
21 Apr 2020
Date

More Related Content

What's hot

Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber securityTobia La Marca
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurityTobia La Marca
 
IntroductionToCybersecurity
IntroductionToCybersecurityIntroductionToCybersecurity
IntroductionToCybersecurityRaphael Mkongoh
 
Cyber security certificate
Cyber security certificateCyber security certificate
Cyber security certificateMahesh Pavaskar
 
Cisco CyberSecurity Course Completion
Cisco CyberSecurity Course CompletionCisco CyberSecurity Course Completion
Cisco CyberSecurity Course CompletionDwayne Clarke
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificateKhizar Farooq
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
Networking essentials certificate
Networking essentials certificateNetworking essentials certificate
Networking essentials certificateKhizar Farooq
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
CISCO CCNA Security Certificate
CISCO CCNA Security CertificateCISCO CCNA Security Certificate
CISCO CCNA Security CertificateKacem CHAMMALI
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROTelecomValley
 

What's hot (19)

security
securitysecurity
security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber security
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
 
Cisco
CiscoCisco
Cisco
 
Cisco Networking Academy®
Cisco Networking Academy® Cisco Networking Academy®
Cisco Networking Academy®
 
IntroductionToCybersecurity
IntroductionToCybersecurityIntroductionToCybersecurity
IntroductionToCybersecurity
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Cyber security certificate
Cyber security certificateCyber security certificate
Cyber security certificate
 
Cisco CyberSecurity Course Completion
Cisco CyberSecurity Course CompletionCisco CyberSecurity Course Completion
Cisco CyberSecurity Course Completion
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificate
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Networking essentials certificate
Networking essentials certificateNetworking essentials certificate
Networking essentials certificate
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
Advanced cyber security course – CIQ
Advanced cyber security course – CIQAdvanced cyber security course – CIQ
Advanced cyber security course – CIQ
 
CISCO CCNA Security Certificate
CISCO CCNA Security CertificateCISCO CCNA Security Certificate
CISCO CCNA Security Certificate
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 

More from Angelo Settembre

SentinelOne Partner Sales Accreditation 101 Certificate.pdf
SentinelOne Partner Sales Accreditation 101 Certificate.pdfSentinelOne Partner Sales Accreditation 101 Certificate.pdf
SentinelOne Partner Sales Accreditation 101 Certificate.pdfAngelo Settembre
 
Splunk 7.x Fundamentals Part 1 (eLearning)
Splunk 7.x Fundamentals Part 1 (eLearning)Splunk 7.x Fundamentals Part 1 (eLearning)
Splunk 7.x Fundamentals Part 1 (eLearning)Angelo Settembre
 
Introduction to CyberArk Privileged Access Security
Introduction to CyberArk Privileged Access SecurityIntroduction to CyberArk Privileged Access Security
Introduction to CyberArk Privileged Access SecurityAngelo Settembre
 
Fortinet Network Security Associate (NSE) 3
Fortinet Network Security Associate (NSE) 3Fortinet Network Security Associate (NSE) 3
Fortinet Network Security Associate (NSE) 3Angelo Settembre
 
Network Security Expert (NSE) 2 The Evolution of Cybersecurity
Network Security Expert (NSE) 2 The Evolution of CybersecurityNetwork Security Expert (NSE) 2 The Evolution of Cybersecurity
Network Security Expert (NSE) 2 The Evolution of CybersecurityAngelo Settembre
 

More from Angelo Settembre (6)

SentinelOne Partner Sales Accreditation 101 Certificate.pdf
SentinelOne Partner Sales Accreditation 101 Certificate.pdfSentinelOne Partner Sales Accreditation 101 Certificate.pdf
SentinelOne Partner Sales Accreditation 101 Certificate.pdf
 
Splunk 7.x Fundamentals Part 1 (eLearning)
Splunk 7.x Fundamentals Part 1 (eLearning)Splunk 7.x Fundamentals Part 1 (eLearning)
Splunk 7.x Fundamentals Part 1 (eLearning)
 
Introduction to CyberArk Privileged Access Security
Introduction to CyberArk Privileged Access SecurityIntroduction to CyberArk Privileged Access Security
Introduction to CyberArk Privileged Access Security
 
Fortinet Network Security Associate (NSE) 3
Fortinet Network Security Associate (NSE) 3Fortinet Network Security Associate (NSE) 3
Fortinet Network Security Associate (NSE) 3
 
Network Security Expert (NSE) 2 The Evolution of Cybersecurity
Network Security Expert (NSE) 2 The Evolution of CybersecurityNetwork Security Expert (NSE) 2 The Evolution of Cybersecurity
Network Security Expert (NSE) 2 The Evolution of Cybersecurity
 
Nse 1 certificate
Nse 1 certificateNse 1 certificate
Nse 1 certificate
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Certificate of Course Completion "Introduction to Cybersecurity" powered by Cisco Networking Academy

  • 1. Corporate Social Responsibility Cisco Networking Academy Certificate of Course Completion Introduction to Cybersecurity For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and demonstrating the ability to explain the following: Global implications of cyber threats Ways in which networks are vulnerable to attack Impact of cyber-attacks on industries Cisco’s approach to threat detection and defense Why cybersecurity is a growing profession Opportunities available for pursuing network security certifications Laura Quintana VP & General Manager, Cisco Networking Academy Angelo Settembre Student 21 Apr 2020 Date