SlideShare a Scribd company logo
December 2017
Introduction to Cybersecurity 2.1
Overview
2
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A report from Frost & Sullivan
and (ISC)2 found that the global
cybersecurity workforce will
have more than 1.5 million
unfilled positions by 2020.
Everyone Needs to
Know
Skill Shortage Hot Jobs
Why Cybersecurity?
Even the grandmas on Facebook
need to know and practice basic
security hygiene, because what
happens everywhere on the Internet
can eventually affect us all.
10 IT skills that Employers need in
2017 – cybersecurity is rated top 3
skills that will be in high demand for
2017. Average salary for entry level
jobs range from US$64k-$113k p.a.
Source: CIO from IDG , Indeed.com
Source: report
Source: Why Cybersecurity Starts at Home
3
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Networking Academy Learning Portfolio
Collaborate for Impact
* Available within 12 months
October 2017
Aligns to Certification
Mobility Fundamentals
CCNA R&S: Introduction to Networks, R&S
Essentials, Scaling Networks, Connecting
Networks
CCNP R&S: Switch, Route, TShoot
Introduction to Cybersecurity
Introduction to IoT
CCNA Security
Cybersecurity Essentials
CCNA Cyber Ops*
Exploratory Foundational Career-Ready
Networking Essentials
Networking
Security
IoT & Analytics
Be Your Own Boss Entrepreneurship
Business
Get Connected
Digital Literacy
NDG Linux Unhatched
NDG Linux Essentials
IT Essentials
Programming
OS & IT
CLP: Advanced Programming in C*
CPP: Advanced Programming in C++
NDG Linux II
Current & Planned
CLA: Programming Essentials in C
CPA: Programming Essentials in C++
NDG Linux I
Emerging Tech Workshop: Experimenting
with REST APIs Using Cisco Spark*
IoT Fundamentals:
Connecting Things, Big Data & Analytics
Hackathon Playbook, IoT Security*
Instructor Training required
Emerging Tech Workshop: Network
Programmability Using Cisco APIC-EM*
Self-paced
PCA: Programming Essentials in Python*
Internships
Prototyping Lab
Hackathons
Packet
Tracer
Introduction to
Packet Tracer
4
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Target Audience: Secondary and 2-Year college students, general
audience
Prerequisites: None
Instructor Training Required: No
Languages: Chinese-S, English (2.1), French, German, Hebrew,
Italian, Japanese, Spanish, Portuguese
Course Delivery: Instructor-led or Self-paced
Estimated Time to Complete: 15 hours
Features
The Introduction to Cybersecurity course explores cyber trends,
threats and staying safe in cyberspace, and protecting personal
and company data.
Course Overview
Learn how to protect your personal data and privacy online and in
social media, and why more and more IT jobs require
cybersecurity awareness and understanding.
Benefits
• 5 modules
• Interactive and instructional content
• 8 Activities and 7 lab exercises that reinforce learning
• 4 quizzes and 1 final exam
• Links to related resources
Learning Components
Introduction
to Cybersecurity
5
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Minor content updates
• Recent security breach example
• Add newly discovered wireless networks security
vulnerability – KRACK
• Update NIST standard for password
• Improve course structure caters to public audience
• Remove irrelevant content and terminologies
• Simplifies certification references
• Improved Accessibility compliant to WCAG 2.0
• Bug fixes and link refreshes
• Refer to Release Notes for details
What’s Changed In 2.1?
6
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Course Outline
Chapter Chapter Titles Summary Description
1 The Need for Cybersecurity
• Learn the need for and importance of cybersecurity.
• Understand the characteristics and value of personal data, and data
within an organization.
2 Attacks, Concepts and
Techniques
• Recognize the characteristics and operation of a cyber attack.
• Interpret the trends in the cyber threat landscape.
3 Protecting Your Data and Privacy
• Understand how to protect devices from threats.
• Master how to safeguard your privacy.
4 Protecting the Organization
• Learn techniques to protect organizations from cyber attacks.
• Recognize the behavior-based approach to cybersecurity.
• Explain Cisco’s approach to cybersecurity.
5 Will Your Future Be in
Cybersecurity?
• Understand legal and ethical issues in cybersecurity
• Explore the opportunities for pursuing an education and a career in
cybersecurity.
7
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 1: The Need for Cybersecurity
Learn what cybersecurity is and why the
demand for cybersecurity professionals is
growing.
Module 1 presents:
• What your online identity and data is,
where it is, and why it is of interest to
cyber criminals.
• What organizational data is, and why it
must be protected.
• What cyber warfare is and why
organizations, nations, and governments
need cybersecurity professionals to
protect their citizens and infrastructure.
8
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 2: Attacks, Concepts and Techniques
Learn how a cybersecurity professional
analyzes a cyberattack.
Module 2 details:
• Security vulnerabilities and the different
types of vulnerabilities and malware.
• The techniques used by attackers to
infiltrate a system.
• The characteristics and operation of a
cyber attack.
• The trends in the cyber threat landscape.
9
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 3: Protecting Your Data and Privacy
Become aware of your personal devices and
data.
Module 3 covers:
• Tips for protecting your personal devices
and data by creating strong passwords
and using wireless networks safely.
• Authentication techniques helping you
maintain your data securely with tips
about what to do and what not to do
online.
• Protecting devices from threats.
• Safeguarding your privacy.
10
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 4: Protecting The Organization
Learn about the technologies, processes, and
best practices used when protecting an
organization’s network.
Module 4 presents:
• Equipment, data, and the commonly used
security terms such as botnets, the kill chain,
and behavior-based security.
• Cisco’s approach to cybersecurity using a
CSIRT team and a security playbook.
• Techniques for protecting organizations from
cyber attacks.
• The behavior-based approach to cybersecurity.
• Cisco’s approach to cybersecurity.
11
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module :5 Will Your Future Be in
Cybersecurity?
Explore educational paths towards
certifications with the Cisco Networking
Academy (NetAcad).
Module 5 summarizes:
• Understand legal and ethical Issues
in Cybersecurity
• Explore the opportunities for
pursuing an education and a career
in cybersecurity.
12
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Visit the Course information page on Cisco
NetAcad.com to enroll in the self-paced course.
If you need assistance, post questions on the Cisco
Networking Academy Facebook page
Students Enrollment and Support
13
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enroll students and teach Introduction to Cybersecurity
in their classrooms through the same process used for
other NetAcad courses
No instructor training required
If you need assistance, contact your Academy Support
Center (ASC)
Instructors Enrollment and Support
14
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Instructor Resources
PPT
Instructor Powerpoints,
Intro to Cyber security
2.1 Overview and Video
FAQ
Frequently Asked
Questions
S&S
Scope & Sequence
Document
Plus
Additional information &
resources
https://www.netacad.com/group/resources/cybersecurity/2.1
15
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
End-of-Life for Introduction to Cybersecurity 2.0
Course Language Last Class Start Date
Introduction to Cybersecurity 2.0 English April 1, 2018
All other available languages are not EOL.
Introduction to Cybersecurity v2.1 - Course Overview.pptx

More Related Content

Similar to Introduction to Cybersecurity v2.1 - Course Overview.pptx

IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptxIoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
Aurelia JQ
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
Skillogic Solutions
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
Skillogic Solutions
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
Skillogic Solutions
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
Skillogic Solutions
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
Nithyesh Panathula
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
Moshiul Islam, CISSP, CISA, CFE
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 

Similar to Introduction to Cybersecurity v2.1 - Course Overview.pptx (20)

IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptxIoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
IoT-Fundamentals-And-Digital-Tranformation-Repaired.pptx
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Introduction to Cybersecurity v2.1 - Course Overview.pptx

  • 1. December 2017 Introduction to Cybersecurity 2.1 Overview
  • 2. 2 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A report from Frost & Sullivan and (ISC)2 found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. Everyone Needs to Know Skill Shortage Hot Jobs Why Cybersecurity? Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens everywhere on the Internet can eventually affect us all. 10 IT skills that Employers need in 2017 – cybersecurity is rated top 3 skills that will be in high demand for 2017. Average salary for entry level jobs range from US$64k-$113k p.a. Source: CIO from IDG , Indeed.com Source: report Source: Why Cybersecurity Starts at Home
  • 3. 3 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Networking Academy Learning Portfolio Collaborate for Impact * Available within 12 months October 2017 Aligns to Certification Mobility Fundamentals CCNA R&S: Introduction to Networks, R&S Essentials, Scaling Networks, Connecting Networks CCNP R&S: Switch, Route, TShoot Introduction to Cybersecurity Introduction to IoT CCNA Security Cybersecurity Essentials CCNA Cyber Ops* Exploratory Foundational Career-Ready Networking Essentials Networking Security IoT & Analytics Be Your Own Boss Entrepreneurship Business Get Connected Digital Literacy NDG Linux Unhatched NDG Linux Essentials IT Essentials Programming OS & IT CLP: Advanced Programming in C* CPP: Advanced Programming in C++ NDG Linux II Current & Planned CLA: Programming Essentials in C CPA: Programming Essentials in C++ NDG Linux I Emerging Tech Workshop: Experimenting with REST APIs Using Cisco Spark* IoT Fundamentals: Connecting Things, Big Data & Analytics Hackathon Playbook, IoT Security* Instructor Training required Emerging Tech Workshop: Network Programmability Using Cisco APIC-EM* Self-paced PCA: Programming Essentials in Python* Internships Prototyping Lab Hackathons Packet Tracer Introduction to Packet Tracer
  • 4. 4 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Target Audience: Secondary and 2-Year college students, general audience Prerequisites: None Instructor Training Required: No Languages: Chinese-S, English (2.1), French, German, Hebrew, Italian, Japanese, Spanish, Portuguese Course Delivery: Instructor-led or Self-paced Estimated Time to Complete: 15 hours Features The Introduction to Cybersecurity course explores cyber trends, threats and staying safe in cyberspace, and protecting personal and company data. Course Overview Learn how to protect your personal data and privacy online and in social media, and why more and more IT jobs require cybersecurity awareness and understanding. Benefits • 5 modules • Interactive and instructional content • 8 Activities and 7 lab exercises that reinforce learning • 4 quizzes and 1 final exam • Links to related resources Learning Components Introduction to Cybersecurity
  • 5. 5 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Minor content updates • Recent security breach example • Add newly discovered wireless networks security vulnerability – KRACK • Update NIST standard for password • Improve course structure caters to public audience • Remove irrelevant content and terminologies • Simplifies certification references • Improved Accessibility compliant to WCAG 2.0 • Bug fixes and link refreshes • Refer to Release Notes for details What’s Changed In 2.1?
  • 6. 6 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Course Outline Chapter Chapter Titles Summary Description 1 The Need for Cybersecurity • Learn the need for and importance of cybersecurity. • Understand the characteristics and value of personal data, and data within an organization. 2 Attacks, Concepts and Techniques • Recognize the characteristics and operation of a cyber attack. • Interpret the trends in the cyber threat landscape. 3 Protecting Your Data and Privacy • Understand how to protect devices from threats. • Master how to safeguard your privacy. 4 Protecting the Organization • Learn techniques to protect organizations from cyber attacks. • Recognize the behavior-based approach to cybersecurity. • Explain Cisco’s approach to cybersecurity. 5 Will Your Future Be in Cybersecurity? • Understand legal and ethical issues in cybersecurity • Explore the opportunities for pursuing an education and a career in cybersecurity.
  • 7. 7 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 1: The Need for Cybersecurity Learn what cybersecurity is and why the demand for cybersecurity professionals is growing. Module 1 presents: • What your online identity and data is, where it is, and why it is of interest to cyber criminals. • What organizational data is, and why it must be protected. • What cyber warfare is and why organizations, nations, and governments need cybersecurity professionals to protect their citizens and infrastructure.
  • 8. 8 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 2: Attacks, Concepts and Techniques Learn how a cybersecurity professional analyzes a cyberattack. Module 2 details: • Security vulnerabilities and the different types of vulnerabilities and malware. • The techniques used by attackers to infiltrate a system. • The characteristics and operation of a cyber attack. • The trends in the cyber threat landscape.
  • 9. 9 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 3: Protecting Your Data and Privacy Become aware of your personal devices and data. Module 3 covers: • Tips for protecting your personal devices and data by creating strong passwords and using wireless networks safely. • Authentication techniques helping you maintain your data securely with tips about what to do and what not to do online. • Protecting devices from threats. • Safeguarding your privacy.
  • 10. 10 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 4: Protecting The Organization Learn about the technologies, processes, and best practices used when protecting an organization’s network. Module 4 presents: • Equipment, data, and the commonly used security terms such as botnets, the kill chain, and behavior-based security. • Cisco’s approach to cybersecurity using a CSIRT team and a security playbook. • Techniques for protecting organizations from cyber attacks. • The behavior-based approach to cybersecurity. • Cisco’s approach to cybersecurity.
  • 11. 11 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module :5 Will Your Future Be in Cybersecurity? Explore educational paths towards certifications with the Cisco Networking Academy (NetAcad). Module 5 summarizes: • Understand legal and ethical Issues in Cybersecurity • Explore the opportunities for pursuing an education and a career in cybersecurity.
  • 12. 12 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Visit the Course information page on Cisco NetAcad.com to enroll in the self-paced course. If you need assistance, post questions on the Cisco Networking Academy Facebook page Students Enrollment and Support
  • 13. 13 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Enroll students and teach Introduction to Cybersecurity in their classrooms through the same process used for other NetAcad courses No instructor training required If you need assistance, contact your Academy Support Center (ASC) Instructors Enrollment and Support
  • 14. 14 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Instructor Resources PPT Instructor Powerpoints, Intro to Cyber security 2.1 Overview and Video FAQ Frequently Asked Questions S&S Scope & Sequence Document Plus Additional information & resources https://www.netacad.com/group/resources/cybersecurity/2.1
  • 15. 15 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential End-of-Life for Introduction to Cybersecurity 2.0 Course Language Last Class Start Date Introduction to Cybersecurity 2.0 English April 1, 2018 All other available languages are not EOL.

Editor's Notes

  1. Firstly, Why is Security Hot? We have been hearing news of security breaches and attacks happening to both small and large organizations, including government agencies. It is almost a regular occurrence. The need for infosec and network security skills, and the resulting opportunities are tremendous. You can read in the slide; the hugh demand and job opportunities for security professionals in the market .
  2. In addition to traditional course offerings, the academy provides Collaborate for Impact events, tools, and opportunities Collaborate for Impact are check-point experiences within the Foundational and Career-Ready offerings, but also independent events and offerings that serve to synthesize all skills learned to date in a problem-solving context.
  3. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  4. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  5. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  6. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  7. Use for vocational and 2- and 4-year college audiences As IT and OT continue to merge, IoT jobs require deeper networking skills in addition to the foundation for Big Data and Analytics. We are confident that students who complete this technician level progression will already be in high demand, and will also be prepared to specialize in new high-demand IoT jobs such as industrial networking.
  8. Given the prevalence of security breeches in the news, it is easy to understand why security is a high demand job family. Our security portfolio develops students that understand security concepts, processes and tools from the edge to the core of the network.