December 2017
Introduction to Cybersecurity 2.1
Overview
2
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A report from Frost & Sullivan
and (ISC)2 found that the global
cybersecurity workforce will
have more than 1.5 million
unfilled positions by 2020.
Everyone Needs to
Know
Skill Shortage Hot Jobs
Why Cybersecurity?
Even the grandmas on Facebook
need to know and practice basic
security hygiene, because what
happens everywhere on the Internet
can eventually affect us all.
10 IT skills that Employers need in
2017 – cybersecurity is rated top 3
skills that will be in high demand for
2017. Average salary for entry level
jobs range from US$64k-$113k p.a.
Source: CIO from IDG , Indeed.com
Source: report
Source: Why Cybersecurity Starts at Home
3
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Networking Academy Learning Portfolio
Collaborate for Impact
* Available within 12 months
October 2017
Aligns to Certification
Mobility Fundamentals
CCNA R&S: Introduction to Networks, R&S
Essentials, Scaling Networks, Connecting
Networks
CCNP R&S: Switch, Route, TShoot
Introduction to Cybersecurity
Introduction to IoT
CCNA Security
Cybersecurity Essentials
CCNA Cyber Ops*
Exploratory Foundational Career-Ready
Networking Essentials
Networking
Security
IoT & Analytics
Be Your Own Boss Entrepreneurship
Business
Get Connected
Digital Literacy
NDG Linux Unhatched
NDG Linux Essentials
IT Essentials
Programming
OS & IT
CLP: Advanced Programming in C*
CPP: Advanced Programming in C++
NDG Linux II
Current & Planned
CLA: Programming Essentials in C
CPA: Programming Essentials in C++
NDG Linux I
Emerging Tech Workshop: Experimenting
with REST APIs Using Cisco Spark*
IoT Fundamentals:
Connecting Things, Big Data & Analytics
Hackathon Playbook, IoT Security*
Instructor Training required
Emerging Tech Workshop: Network
Programmability Using Cisco APIC-EM*
Self-paced
PCA: Programming Essentials in Python*
Internships
Prototyping Lab
Hackathons
Packet
Tracer
Introduction to
Packet Tracer
4
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Target Audience: Secondary and 2-Year college students, general
audience
Prerequisites: None
Instructor Training Required: No
Languages: Chinese-S, English (2.1), French, German, Hebrew,
Italian, Japanese, Spanish, Portuguese
Course Delivery: Instructor-led or Self-paced
Estimated Time to Complete: 15 hours
Features
The Introduction to Cybersecurity course explores cyber trends,
threats and staying safe in cyberspace, and protecting personal
and company data.
Course Overview
Learn how to protect your personal data and privacy online and in
social media, and why more and more IT jobs require
cybersecurity awareness and understanding.
Benefits
• 5 modules
• Interactive and instructional content
• 8 Activities and 7 lab exercises that reinforce learning
• 4 quizzes and 1 final exam
• Links to related resources
Learning Components
Introduction
to Cybersecurity
5
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Minor content updates
• Recent security breach example
• Add newly discovered wireless networks security
vulnerability – KRACK
• Update NIST standard for password
• Improve course structure caters to public audience
• Remove irrelevant content and terminologies
• Simplifies certification references
• Improved Accessibility compliant to WCAG 2.0
• Bug fixes and link refreshes
• Refer to Release Notes for details
What’s Changed In 2.1?
6
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Course Outline
Chapter Chapter Titles Summary Description
1 The Need for Cybersecurity
• Learn the need for and importance of cybersecurity.
• Understand the characteristics and value of personal data, and data
within an organization.
2 Attacks, Concepts and
Techniques
• Recognize the characteristics and operation of a cyber attack.
• Interpret the trends in the cyber threat landscape.
3 Protecting Your Data and Privacy
• Understand how to protect devices from threats.
• Master how to safeguard your privacy.
4 Protecting the Organization
• Learn techniques to protect organizations from cyber attacks.
• Recognize the behavior-based approach to cybersecurity.
• Explain Cisco’s approach to cybersecurity.
5 Will Your Future Be in
Cybersecurity?
• Understand legal and ethical issues in cybersecurity
• Explore the opportunities for pursuing an education and a career in
cybersecurity.
7
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 1: The Need for Cybersecurity
Learn what cybersecurity is and why the
demand for cybersecurity professionals is
growing.
Module 1 presents:
• What your online identity and data is,
where it is, and why it is of interest to
cyber criminals.
• What organizational data is, and why it
must be protected.
• What cyber warfare is and why
organizations, nations, and governments
need cybersecurity professionals to
protect their citizens and infrastructure.
8
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 2: Attacks, Concepts and Techniques
Learn how a cybersecurity professional
analyzes a cyberattack.
Module 2 details:
• Security vulnerabilities and the different
types of vulnerabilities and malware.
• The techniques used by attackers to
infiltrate a system.
• The characteristics and operation of a
cyber attack.
• The trends in the cyber threat landscape.
9
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 3: Protecting Your Data and Privacy
Become aware of your personal devices and
data.
Module 3 covers:
• Tips for protecting your personal devices
and data by creating strong passwords
and using wireless networks safely.
• Authentication techniques helping you
maintain your data securely with tips
about what to do and what not to do
online.
• Protecting devices from threats.
• Safeguarding your privacy.
10
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 4: Protecting The Organization
Learn about the technologies, processes, and
best practices used when protecting an
organization’s network.
Module 4 presents:
• Equipment, data, and the commonly used
security terms such as botnets, the kill chain,
and behavior-based security.
• Cisco’s approach to cybersecurity using a
CSIRT team and a security playbook.
• Techniques for protecting organizations from
cyber attacks.
• The behavior-based approach to cybersecurity.
• Cisco’s approach to cybersecurity.
11
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module :5 Will Your Future Be in
Cybersecurity?
Explore educational paths towards
certifications with the Cisco Networking
Academy (NetAcad).
Module 5 summarizes:
• Understand legal and ethical Issues
in Cybersecurity
• Explore the opportunities for
pursuing an education and a career
in cybersecurity.
12
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Visit the Course information page on Cisco
NetAcad.com to enroll in the self-paced course.
If you need assistance, post questions on the Cisco
Networking Academy Facebook page
Students Enrollment and Support
13
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enroll students and teach Introduction to Cybersecurity
in their classrooms through the same process used for
other NetAcad courses
No instructor training required
If you need assistance, contact your Academy Support
Center (ASC)
Instructors Enrollment and Support
14
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Instructor Resources
PPT
Instructor Powerpoints,
Intro to Cyber security
2.1 Overview and Video
FAQ
Frequently Asked
Questions
S&S
Scope & Sequence
Document
Plus
Additional information &
resources
https://www.netacad.com/group/resources/cybersecurity/2.1
15
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
End-of-Life for Introduction to Cybersecurity 2.0
Course Language Last Class Start Date
Introduction to Cybersecurity 2.0 English April 1, 2018
All other available languages are not EOL.
Introduction to Cybersecurity v2.1 - Course Overview.pptx

Introduction to Cybersecurity v2.1 - Course Overview.pptx

  • 1.
    December 2017 Introduction toCybersecurity 2.1 Overview
  • 2.
    2 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential A report from Frost & Sullivan and (ISC)2 found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. Everyone Needs to Know Skill Shortage Hot Jobs Why Cybersecurity? Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens everywhere on the Internet can eventually affect us all. 10 IT skills that Employers need in 2017 – cybersecurity is rated top 3 skills that will be in high demand for 2017. Average salary for entry level jobs range from US$64k-$113k p.a. Source: CIO from IDG , Indeed.com Source: report Source: Why Cybersecurity Starts at Home
  • 3.
    3 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential The Networking Academy Learning Portfolio Collaborate for Impact * Available within 12 months October 2017 Aligns to Certification Mobility Fundamentals CCNA R&S: Introduction to Networks, R&S Essentials, Scaling Networks, Connecting Networks CCNP R&S: Switch, Route, TShoot Introduction to Cybersecurity Introduction to IoT CCNA Security Cybersecurity Essentials CCNA Cyber Ops* Exploratory Foundational Career-Ready Networking Essentials Networking Security IoT & Analytics Be Your Own Boss Entrepreneurship Business Get Connected Digital Literacy NDG Linux Unhatched NDG Linux Essentials IT Essentials Programming OS & IT CLP: Advanced Programming in C* CPP: Advanced Programming in C++ NDG Linux II Current & Planned CLA: Programming Essentials in C CPA: Programming Essentials in C++ NDG Linux I Emerging Tech Workshop: Experimenting with REST APIs Using Cisco Spark* IoT Fundamentals: Connecting Things, Big Data & Analytics Hackathon Playbook, IoT Security* Instructor Training required Emerging Tech Workshop: Network Programmability Using Cisco APIC-EM* Self-paced PCA: Programming Essentials in Python* Internships Prototyping Lab Hackathons Packet Tracer Introduction to Packet Tracer
  • 4.
    4 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Target Audience: Secondary and 2-Year college students, general audience Prerequisites: None Instructor Training Required: No Languages: Chinese-S, English (2.1), French, German, Hebrew, Italian, Japanese, Spanish, Portuguese Course Delivery: Instructor-led or Self-paced Estimated Time to Complete: 15 hours Features The Introduction to Cybersecurity course explores cyber trends, threats and staying safe in cyberspace, and protecting personal and company data. Course Overview Learn how to protect your personal data and privacy online and in social media, and why more and more IT jobs require cybersecurity awareness and understanding. Benefits • 5 modules • Interactive and instructional content • 8 Activities and 7 lab exercises that reinforce learning • 4 quizzes and 1 final exam • Links to related resources Learning Components Introduction to Cybersecurity
  • 5.
    5 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential • Minor content updates • Recent security breach example • Add newly discovered wireless networks security vulnerability – KRACK • Update NIST standard for password • Improve course structure caters to public audience • Remove irrelevant content and terminologies • Simplifies certification references • Improved Accessibility compliant to WCAG 2.0 • Bug fixes and link refreshes • Refer to Release Notes for details What’s Changed In 2.1?
  • 6.
    6 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Course Outline Chapter Chapter Titles Summary Description 1 The Need for Cybersecurity • Learn the need for and importance of cybersecurity. • Understand the characteristics and value of personal data, and data within an organization. 2 Attacks, Concepts and Techniques • Recognize the characteristics and operation of a cyber attack. • Interpret the trends in the cyber threat landscape. 3 Protecting Your Data and Privacy • Understand how to protect devices from threats. • Master how to safeguard your privacy. 4 Protecting the Organization • Learn techniques to protect organizations from cyber attacks. • Recognize the behavior-based approach to cybersecurity. • Explain Cisco’s approach to cybersecurity. 5 Will Your Future Be in Cybersecurity? • Understand legal and ethical issues in cybersecurity • Explore the opportunities for pursuing an education and a career in cybersecurity.
  • 7.
    7 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Module 1: The Need for Cybersecurity Learn what cybersecurity is and why the demand for cybersecurity professionals is growing. Module 1 presents: • What your online identity and data is, where it is, and why it is of interest to cyber criminals. • What organizational data is, and why it must be protected. • What cyber warfare is and why organizations, nations, and governments need cybersecurity professionals to protect their citizens and infrastructure.
  • 8.
    8 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Module 2: Attacks, Concepts and Techniques Learn how a cybersecurity professional analyzes a cyberattack. Module 2 details: • Security vulnerabilities and the different types of vulnerabilities and malware. • The techniques used by attackers to infiltrate a system. • The characteristics and operation of a cyber attack. • The trends in the cyber threat landscape.
  • 9.
    9 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Module 3: Protecting Your Data and Privacy Become aware of your personal devices and data. Module 3 covers: • Tips for protecting your personal devices and data by creating strong passwords and using wireless networks safely. • Authentication techniques helping you maintain your data securely with tips about what to do and what not to do online. • Protecting devices from threats. • Safeguarding your privacy.
  • 10.
    10 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Module 4: Protecting The Organization Learn about the technologies, processes, and best practices used when protecting an organization’s network. Module 4 presents: • Equipment, data, and the commonly used security terms such as botnets, the kill chain, and behavior-based security. • Cisco’s approach to cybersecurity using a CSIRT team and a security playbook. • Techniques for protecting organizations from cyber attacks. • The behavior-based approach to cybersecurity. • Cisco’s approach to cybersecurity.
  • 11.
    11 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Module :5 Will Your Future Be in Cybersecurity? Explore educational paths towards certifications with the Cisco Networking Academy (NetAcad). Module 5 summarizes: • Understand legal and ethical Issues in Cybersecurity • Explore the opportunities for pursuing an education and a career in cybersecurity.
  • 12.
    12 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Visit the Course information page on Cisco NetAcad.com to enroll in the self-paced course. If you need assistance, post questions on the Cisco Networking Academy Facebook page Students Enrollment and Support
  • 13.
    13 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Enroll students and teach Introduction to Cybersecurity in their classrooms through the same process used for other NetAcad courses No instructor training required If you need assistance, contact your Academy Support Center (ASC) Instructors Enrollment and Support
  • 14.
    14 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Instructor Resources PPT Instructor Powerpoints, Intro to Cyber security 2.1 Overview and Video FAQ Frequently Asked Questions S&S Scope & Sequence Document Plus Additional information & resources https://www.netacad.com/group/resources/cybersecurity/2.1
  • 15.
    15 © 2017 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential End-of-Life for Introduction to Cybersecurity 2.0 Course Language Last Class Start Date Introduction to Cybersecurity 2.0 English April 1, 2018 All other available languages are not EOL.

Editor's Notes

  • #3 Firstly, Why is Security Hot? We have been hearing news of security breaches and attacks happening to both small and large organizations, including government agencies. It is almost a regular occurrence. The need for infosec and network security skills, and the resulting opportunities are tremendous. You can read in the slide; the hugh demand and job opportunities for security professionals in the market .
  • #4 In addition to traditional course offerings, the academy provides Collaborate for Impact events, tools, and opportunities Collaborate for Impact are check-point experiences within the Foundational and Career-Ready offerings, but also independent events and offerings that serve to synthesize all skills learned to date in a problem-solving context.
  • #8 Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  • #9 Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  • #10 Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  • #11 Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  • #12 Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  • #13 Given the prevalence of security breeches in the news, it is easy to understand why security is a high demand job family. Our security portfolio develops students that understand security concepts, processes and tools from the edge to the core of the network.