SlideShare a Scribd company logo
Corporate
Social
Responsibility
Cisco Networking Academy
Certificate of Course Completion
Cybersecurity Essentials
For completing the Cisco Networking Academy® Cybersecurity Essentials course, and demonstrating the following abilities:
Describe the tactics, techniques and procedures used by cyber
criminals.
Describe the principles of confidentiality, integrity, and availability as
they relate to data states and cybersecurity countermeasures.
Describe technologies, products and procedures used to protect
confidentiality, ensure integrity and provide high availability.
Explain how cybersecurity professionals use technologies, processes
and procedures to defend all components of the network.
Explain the purpose of laws related to cybersecurity.
Laura Quintana
VP & General Manager, Cisco Networking Academy
Carmine Castaldo Tuccillo
Student
3 May 2020
Date

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
Manjushree Mashal
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Jim Fenton
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
amansyal
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
Luckeylama
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
SnehithaKurimelli
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Network security
Network securityNetwork security
Network security
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Network security
Network securityNetwork security
Network security
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Email security
Email securityEmail security
Email security
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Cybersecurity Essentials

cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
Nithyesh Panathula
 
Cybersecurity Essentials - Certification
Cybersecurity Essentials - CertificationCybersecurity Essentials - Certification
Cybersecurity Essentials - Certification
Mohamed Haathim Sharfraz
 
CERTIFICADO DE SEGURIDAD.pdf
CERTIFICADO DE SEGURIDAD.pdfCERTIFICADO DE SEGURIDAD.pdf
CERTIFICADO DE SEGURIDAD.pdf
SterlyBrito
 
PRIYANKRAI-Cybersecurity Es-certificate.pdf
PRIYANKRAI-Cybersecurity Es-certificate.pdfPRIYANKRAI-Cybersecurity Es-certificate.pdf
PRIYANKRAI-Cybersecurity Es-certificate.pdf
132PRIYANKRAI
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
SHUBHAPRASADMOHANTY
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
Skillogic Solutions
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
Skillogic Solutions
 
Skillogic Cyber security Course in Pune
Skillogic Cyber security Course in  PuneSkillogic Cyber security Course in  Pune
Skillogic Cyber security Course in Pune
Skillogic Solutions
 
Skillogic Cyber Security Training Course in pune
Skillogic Cyber Security Training Course in puneSkillogic Cyber Security Training Course in pune
Skillogic Cyber Security Training Course in pune
Skillogic Solutions
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
Skillogic Solutions
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
Skillogic Solutions
 
Datasheet
DatasheetDatasheet
Datasheet
Carlos urrea
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
Skillogic Solutions
 
Skillogic Cyber Security Certification Training Course in Pune
Skillogic Cyber Security Certification Training Course in PuneSkillogic Cyber Security Certification Training Course in Pune
Skillogic Cyber Security Certification Training Course in Pune
Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
Skillogic Solutions
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
Skillogic Solutions
 

Similar to Cybersecurity Essentials (20)

cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
 
Cybersecurity Essentials - Certification
Cybersecurity Essentials - CertificationCybersecurity Essentials - Certification
Cybersecurity Essentials - Certification
 
CERTIFICADO DE SEGURIDAD.pdf
CERTIFICADO DE SEGURIDAD.pdfCERTIFICADO DE SEGURIDAD.pdf
CERTIFICADO DE SEGURIDAD.pdf
 
PRIYANKRAI-Cybersecurity Es-certificate.pdf
PRIYANKRAI-Cybersecurity Es-certificate.pdfPRIYANKRAI-Cybersecurity Es-certificate.pdf
PRIYANKRAI-Cybersecurity Es-certificate.pdf
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
 
Skillogic Cyber security Course in Pune
Skillogic Cyber security Course in  PuneSkillogic Cyber security Course in  Pune
Skillogic Cyber security Course in Pune
 
Skillogic Cyber Security Training Course in pune
Skillogic Cyber Security Training Course in puneSkillogic Cyber Security Training Course in pune
Skillogic Cyber Security Training Course in pune
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
 
Datasheet
DatasheetDatasheet
Datasheet
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Skillogic Cyber Security Certification Training Course in Pune
Skillogic Cyber Security Certification Training Course in PuneSkillogic Cyber Security Certification Training Course in Pune
Skillogic Cyber Security Certification Training Course in Pune
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 

Recently uploaded

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 

Recently uploaded (12)

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 

Cybersecurity Essentials

  • 1. Corporate Social Responsibility Cisco Networking Academy Certificate of Course Completion Cybersecurity Essentials For completing the Cisco Networking Academy® Cybersecurity Essentials course, and demonstrating the following abilities: Describe the tactics, techniques and procedures used by cyber criminals. Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high availability. Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network. Explain the purpose of laws related to cybersecurity. Laura Quintana VP & General Manager, Cisco Networking Academy Carmine Castaldo Tuccillo Student 3 May 2020 Date