SlideShare a Scribd company logo
Certificate of Completion
Jan 28, 2015
Date
For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and
demonstrating the ability to explain the following:
• Global implications of cyber threats
• Ways in which networks are vulnerable to attack
• Impact of cyber-attacks on industries
• Cisco’s approach to threat detection and defense
• Why cybersecurity is a growing profession
• Opportunities available for pursuing network security certifications
Presented to:
Kenan Spahi
Name

More Related Content

What's hot

Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)
Pedro Silva
 
Cyber Security Completion Certificate
Cyber Security Completion CertificateCyber Security Completion Certificate
Cyber Security Completion Certificate
reazrana
 
IntroductionToCybersecurity
IntroductionToCybersecurityIntroductionToCybersecurity
IntroductionToCybersecurity
Raphael Mkongoh
 
Cisco- intro to Cybersecurity certification
Cisco- intro to Cybersecurity certificationCisco- intro to Cybersecurity certification
Cisco- intro to Cybersecurity certification
Davashkar Virasamy
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Michael Vrutaal
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)
 
Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber security
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security Completion Certificate
Cyber Security Completion CertificateCyber Security Completion Certificate
Cyber Security Completion Certificate
 
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
 
IntroductionToCybersecurity
IntroductionToCybersecurityIntroductionToCybersecurity
IntroductionToCybersecurity
 
Cisco- intro to Cybersecurity certification
Cisco- intro to Cybersecurity certificationCisco- intro to Cybersecurity certification
Cisco- intro to Cybersecurity certification
 
Deny indragunawan intro to cyberse-certificate
Deny indragunawan intro to cyberse-certificateDeny indragunawan intro to cyberse-certificate
Deny indragunawan intro to cyberse-certificate
 
Cisco Networking Academy®
Cisco Networking Academy® Cisco Networking Academy®
Cisco Networking Academy®
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificate
 
Networking essentials certificate
Networking essentials certificateNetworking essentials certificate
Networking essentials certificate
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 

Viewers also liked

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Robin Rafique
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Google's Driverless Car Project
Google's Driverless Car ProjectGoogle's Driverless Car Project
Google's Driverless Car Project
Ray Yip
 

Viewers also liked (18)

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility WorldAutonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
 
Autonomous Vehicles - Impacts and Opportunities
Autonomous Vehicles - Impacts and OpportunitiesAutonomous Vehicles - Impacts and Opportunities
Autonomous Vehicles - Impacts and Opportunities
 
Infineon Car Security
Infineon Car SecurityInfineon Car Security
Infineon Car Security
 
Infineon Company Presentation Q1 2015
Infineon Company Presentation Q1 2015Infineon Company Presentation Q1 2015
Infineon Company Presentation Q1 2015
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and Opportunities
 
Cyber security
Cyber securityCyber security
Cyber security
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Driving Disrupted: Driverless Cars Change Everything
Driving Disrupted: Driverless Cars Change EverythingDriving Disrupted: Driverless Cars Change Everything
Driving Disrupted: Driverless Cars Change Everything
 
Google's Driverless Car Project
Google's Driverless Car ProjectGoogle's Driverless Car Project
Google's Driverless Car Project
 

Cybersecurity

  • 1. Certificate of Completion Jan 28, 2015 Date For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and demonstrating the ability to explain the following: • Global implications of cyber threats • Ways in which networks are vulnerable to attack • Impact of cyber-attacks on industries • Cisco’s approach to threat detection and defense • Why cybersecurity is a growing profession • Opportunities available for pursuing network security certifications Presented to: Kenan Spahi Name