SlideShare a Scribd company logo
Corporate
Social
Responsibility
Cisco Networking Academy
Certificate of Course Completion
Introduction to Cybersecurity
For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and demonstrating the ability to explain the
following:
Global implications of cyber threats
Ways in which networks are vulnerable to attack
Impact of cyber-attacks on industries
Cisco’s approach to threat detection and defense
Why cybersecurity is a growing profession
Opportunities available for pursuing network security certifications
Laura Quintana
VP & General Manager, Cisco Networking Academy
Nithyesh Panathula
Student
26 Apr 2020
Date

More Related Content

What's hot

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecuritySergei Chernooki
 
Cyber Security Completion Certificate
Cyber Security Completion CertificateCyber Security Completion Certificate
Cyber Security Completion Certificatereazrana
 
IntroductionToCybersecurity
IntroductionToCybersecurityIntroductionToCybersecurity
IntroductionToCybersecurityRaphael Mkongoh
 
Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber security
Tobia La Marca
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
Tobia La Marca
 
Cyber security certificate
Cyber security certificateCyber security certificate
Cyber security certificateMahesh Pavaskar
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
CarmineCastaldoTucci
 
Cisco Networking Academy®
Cisco Networking Academy® Cisco Networking Academy®
Cisco Networking Academy®
Shamistan ARZIMANLI
 
Cisco CyberSecurity Course Completion
Cisco CyberSecurity Course CompletionCisco CyberSecurity Course Completion
Cisco CyberSecurity Course CompletionDwayne Clarke
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificate
Khizar Farooq
 
Advanced cyber security course – CIQ
Advanced cyber security course – CIQAdvanced cyber security course – CIQ
Advanced cyber security course – CIQ
CentreforInternationalQualifications
 
Networking essentials certificate
Networking essentials certificateNetworking essentials certificate
Networking essentials certificate
Khizar Farooq
 
CISCO CCNA Security Certificate
CISCO CCNA Security CertificateCISCO CCNA Security Certificate
CISCO CCNA Security Certificate
Kacem CHAMMALI
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
SHUBHAPRASADMOHANTY
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
Community Protection Forum
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
 

What's hot (19)

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cisco
CiscoCisco
Cisco
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Completion Certificate
Cyber Security Completion CertificateCyber Security Completion Certificate
Cyber Security Completion Certificate
 
IntroductionToCybersecurity
IntroductionToCybersecurityIntroductionToCybersecurity
IntroductionToCybersecurity
 
Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber security
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
 
Cyber security certificate
Cyber security certificateCyber security certificate
Cyber security certificate
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Cisco Networking Academy®
Cisco Networking Academy® Cisco Networking Academy®
Cisco Networking Academy®
 
Cisco CyberSecurity Course Completion
Cisco CyberSecurity Course CompletionCisco CyberSecurity Course Completion
Cisco CyberSecurity Course Completion
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificate
 
Advanced cyber security course – CIQ
Advanced cyber security course – CIQAdvanced cyber security course – CIQ
Advanced cyber security course – CIQ
 
Networking essentials certificate
Networking essentials certificateNetworking essentials certificate
Networking essentials certificate
 
CISCO CCNA Security Certificate
CISCO CCNA Security CertificateCISCO CCNA Security Certificate
CISCO CCNA Security Certificate
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 

More from Nithyesh Panathula

ICFI Certificate.pdf
ICFI Certificate.pdfICFI Certificate.pdf
ICFI Certificate.pdf
Nithyesh Panathula
 
Google Cloud Digital leader
Google Cloud Digital leaderGoogle Cloud Digital leader
Google Cloud Digital leader
Nithyesh Panathula
 
Certified Network Security Specialist
Certified Network Security SpecialistCertified Network Security Specialist
Certified Network Security Specialist
Nithyesh Panathula
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
Nithyesh Panathula
 
NSE
NSENSE
Nse 2 certificate
Nse 2 certificateNse 2 certificate
Nse 2 certificate
Nithyesh Panathula
 
Nse 1 certificate
Nse 1 certificateNse 1 certificate
Nse 1 certificate
Nithyesh Panathula
 
1795704
17957041795704
1769958
17699581769958
1690016
16900161690016
Data science with Python
Data science with PythonData science with Python
Data science with Python
Nithyesh Panathula
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
Nithyesh Panathula
 

More from Nithyesh Panathula (12)

ICFI Certificate.pdf
ICFI Certificate.pdfICFI Certificate.pdf
ICFI Certificate.pdf
 
Google Cloud Digital leader
Google Cloud Digital leaderGoogle Cloud Digital leader
Google Cloud Digital leader
 
Certified Network Security Specialist
Certified Network Security SpecialistCertified Network Security Specialist
Certified Network Security Specialist
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
 
NSE
NSENSE
NSE
 
Nse 2 certificate
Nse 2 certificateNse 2 certificate
Nse 2 certificate
 
Nse 1 certificate
Nse 1 certificateNse 1 certificate
Nse 1 certificate
 
1795704
17957041795704
1795704
 
1769958
17699581769958
1769958
 
1690016
16900161690016
1690016
 
Data science with Python
Data science with PythonData science with Python
Data science with Python
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Cyber security

  • 1. Corporate Social Responsibility Cisco Networking Academy Certificate of Course Completion Introduction to Cybersecurity For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and demonstrating the ability to explain the following: Global implications of cyber threats Ways in which networks are vulnerable to attack Impact of cyber-attacks on industries Cisco’s approach to threat detection and defense Why cybersecurity is a growing profession Opportunities available for pursuing network security certifications Laura Quintana VP & General Manager, Cisco Networking Academy Nithyesh Panathula Student 26 Apr 2020 Date