Cyber Security
- Description
- Curriculum
- Reviews
-
1Class one (Inroduction to Cybersecurity Career)3 Hours
In this lesson, you will learn about the huge demand for Cybersecurity professionals and how you can enter the field. You will learn the different training options that are available for starting a career in Cybersecurity.
The lesson will cover the different roles and responsibilities of entry-level, mid-level, and advanced-level cybersecurity professionals.
In addition, you will learn the the skills you must posses to be sucsessful as a cybersecurity professioner and the range of salaries awarded to the roles at the different levels of Cybersecurity careers.
-
2Class two (Foundations of Cybersecurity)3 Hours
This course heps kick off your journey into cybersecurity! You'll explore the cybersecurity field, and learn about the job responsibilities of cybersecurity professionals.
You understand the effect of attacks on businesses you can arrange to mitigate the attacks.
-
3Class three (Introduction to Hardware & Operating System)3 Hours
In this lesson, you’ll learn about common external and internal components of home and business computer systems. You will be introduced to some operating system.
-
4WEEK 1Assignment
-
5Class one (Introduction to Software, Programing and Database - Part 1 )3 Hours
This course introduces you to software, licenses and coud computing
-
6Class Two (Security principles) Part 13 Hours
This course will hep you to, among other things: Discuss the foundational concepts of cybersecurity principles. Recognize foundational security concepts of information assurance. Define risk management terminology and summarize the process. Relate risk management to personal or professional practices. Classify types of security controls. Distinguish between policies, procedures, standards, regulations and laws. Demonstrate the relationship among governance elements. Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples.
-
7Class Three (Security principles) Part 23 Hours
This course will hep you to, among others other things: Classify types of security controls. Distinguish between policies, procedures, standards, regulations and laws. Demonstrate the relationship among governance elements. Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples.
-
8Class one (Introduction to Software, Programing and Database - Part 1 )4 questions
-
9WEEK 2Assignment
-
10Class one (Security Risk Management)3 Hours
By the end of this course, you will develop a greater understanding of the eight Certified Information Systems Security Professional (CISSP) security domains, as well as specific security frameworks and controls. You’ll also be introduced to how to use security tools and audits to help protect assets and data. These are key concepts in the cybersecurity field, and understanding them will help you keep organizations, and the people they serve, safe from threats, risks, and vulnerabilities.
-
11Class one (Security risk Management)4 questions
-
12Class two (Assets, Threats and Vulnerabilities) Part 13 Hours
You will be introduced to how organizations determine what assets to protect. You'll learn about the connection between managing risk and classifying assets by exploring the unique challenge of securing physical and digital assets. You'll also be introduced to the National Institute of Standards and Technology (NIST) framework standards, guidelines and best practices to manage cybersecurity risk.
-
13Class Two (Assets, Threats and Vulnerabilities) Part 15 questions
-
14Class three (Assets, Threats and Vulnerabilities) Part 23 Hours
You will focus on security controls that protect organizational assets. You'll explore how privacy impacts asset security and understand the role that encryption plays in maintaining the privacy of digital assets. You'll also explore how authentication and authorization systems help verify a user’s identity.
-
15WEEK 3Assignment
-
16Class One (Assets, Threats and Vulnerabilities) Part 33 Hours
You will build an understanding of the vulnerability management process. You'll learn about common vulnerabilities and develop an attacker mindset by examining the ways vulnerabilities can become threats to asset security if they are exploited.
-
17Class One (Assets, Threats and Vulnerabilities) Part 34 questions
-
18WEEK 4Assignment
-
19Class two (Assets, Threats and Vulnerabilities) Part 43 Hours
You will explore common types of threats to digital asset security. You'll also examine the tools and techniques used by cybercriminals to target assets. In addition, you'll be introduced to the threat modeling process and learn ways security professionals stay ahead of security breaches.
-
20Class Two (Assets, Threats and Vulnerabilities) Part 44 questions
-
21Class two (Assets, Threats and Vulnerabilities) Part 43 Hours
Class recording
-
22Class two (Assets, Threats and Vulnerabilities) Part 4(1)4:58 (2) 6:05
Threat modeling
-
23Class Three (Review of modules 1 to 11)3 Hours
-
24Class one (Access Control Concept)3 Hours
Course Objectives
l Select access controls that are appropriate in a given scenario.
l Relate access control concepts and processes to given scenarios.
l Compare various physical access controls.
l Describe logical access controls.
l Practice the terminology of access controls and review concepts of access controls
-
25WEEK 5Assignment
-
26Class one (Access Control Concept)Video lesson
Class recoding
-
27Class Two (Holiday)3 Hours
Pubic holiday
-
28Class Three (Holiday)3 Hours
Public holiday
-
29Week 6Assignment
-
30Class One (Introduction to Cybersecurity Essentials) Part 13 Hours
COMMON SECURITY THREATS AND RISKS
This module will teach you the skills you need to identify basic security threats and choose the best security practices to address those threats. You’ll learn the difference between data, information, and insights and how companies leverage all three to help guide their business decisions. You’ll learn how to maintain data integrity and keep data confidential. You’ll also begin to learn about the different types of attacks and breaches that threaten today’s organizations and their data.
-
31Class One (Inroduction to Cybersecurity Essentias) Part 1QuizCommon Security Threat and Risk
-
32Class Two (Introduction to Cybersecurity Essential) Part 23 Hours
SECURITY BEST PRACTICES
Living in a world filled with cyber criminers, there’s unfotunately no single solution for effective cybersecurity. The best practice is to use multiple layers of security. Some great first steps you can take to improve security and build a solid foundation to protect against cyberattacks are to use strong passwords, good password management, and multi-factor authentication.
-
33Class Two (Introduction to Cybersecurity Essentials) Part 25 questionsSecurity Best Practices
-
34Class Three (Introduction to Cybersecurity Essentials) Part 33 Hours
SAFE BROWSING PRACTICES
The Internet can be an awesome place to go for entertainment, learning, and other online experiences. But the Internet isn’t safe. Hackers, phishing, identity theft, security leaks, privacy issues, and more are valid reasons to consistently practice safe browsing to protect yourself. This week, you will learn about safety concerns with applications and public browsing, including managing plug-ins, extensions, and toolbars. You will learn about web browser security configurations, cookies, and computer caches.
-
35Class Three (Introduction to Cybersecurity Essentials) Part 35 questionsSafe Browsing Practices
-
36DAY 2DAY 2
-
37Comptia A + Lecture Configuring SOHO Network Security3 hours
Well dealing with configuration of SOHO, Explainig Attacks, threats and Vulnerabilities, Social Engineering...
-
38MOD 1- 4 Cisco Junior Cyber Security Portal-NEWTWORK BASICSAssignment
-
39MOD 5- 7 Cisco Junior Cyber Security Portal-NEWTWORK BASICSAssignment
-
40QUIZ COMPTIA A+3 questionsThis is a single quiz section pick the most suitable answer for the questions
-
41Configuring SOHO Network SecurityPreview 3 HOURS
-
42SOHO NETWORK 2Video lesson
-
43SOHO NETWORK 3Video lesson
-
44DAY 3DAY 3
-
45Comptia A+ Lecture •Network Types3 HOURS•Network Types•Network Standards and the OSI Model•Data Transmission Methods
-
46QUIZ NETWORK +.3 questions
-
47Network TheoryVideo lesson
-
48Network Theory 2Video lesson
-
49Network Theory 3Video lesson
-
50Network Theory 4Video lesson
-
51DAY 13 HOURS
o TCP/IP Addressing and Data Delivery
TechEdu is inviting you to a scheduled Zoom meeting.
Topic: CYBER SECURITY
Time: Jul 22, 2024 08:00 AM West Central Africa
Every week on Mon, 3 occurrence(s)
Jul 22, 2024 08:00 AM
Jul 29, 2024 08:00 AM
Aug 5, 2024 08:00 AM
Please download and import the following iCalendar (.ics) files to your calendar system.
Weekly: https://us06web.zoom.us/meeting/tZYvdeqprTguEtI0Gkb5BaZF5-Sr-I1lzDUe/ics?icsToken=98tyKuGqrDkpG9eWtBGBRpwQAIjob-vztnZbj7d0zDjuAXVxYznQY69xIP9WQdTK
Join Zoom Meeting
https://us06web.zoom.us/j/82223133486?pwd=h0SA7CSt1hraDDdzB24Tzi0idFoleU.1
Meeting ID: 822 2313 3486
Passcode: 175209
---
One tap mobile
+13017158592,,82223133486#,,,,*175209# US (Washington DC)
+13052241968,,82223133486#,,,,*175209# US
---
Dial by your location
• +1 301 715 8592 US (Washington DC)
• +1 305 224 1968 US
• +1 309 205 3325 US
• +1 312 626 6799 US (Chicago)
• +1 646 558 8656 US (New York)
• +1 646 931 3860 US
• +1 253 215 8782 US (Tacoma)
• +1 346 248 7799 US (Houston)
• +1 360 209 5623 US
• +1 386 347 5053 US
• +1 507 473 4847 US
• +1 564 217 2000 US
• +1 669 444 9171 US
• +1 689 278 1000 US
• +1 719 359 4580 US
• +1 720 707 2699 US (Denver)
• +1 253 205 0468 US
Meeting ID: 822 2313 3486
Passcode: 175209
Find your local number: https://us06web.zoom.us/u/kd4CDHJhGl
-
52Comptia N+3 HOURS•Part of the TCP/IP protocol suite.•Ensures end-to-end delivery between distinct nodes.•Creates connection prior to transmission.•At the source node, breaks data into segments, sends it, and waits for acknowledgment.•At the destination node, reassembles segments into original data.•Resends any data lost in transit.
-
53MOD 8-11 Cisco junior CybersecurityAssignment
-
54MOD 12-14 Cisco junior CybersecurityAssignment
-
55QUIZ NETWORK +3 questions
-
56TCP/IP Addressing and Data Delivery3 HOURS
-
57TCP/IP Addressing and Data DeliveryVideo lesson
-
58TCP/I[ Addressing and DataVideo lesson
-
59Day 2Text lesson
TCP/IP Implementation
-
60Comptia N+3 HOURS
TCP/IP Implementation
-
61QUIZ Comptia N+3 questions
-
62Harde ware refreshVideo lesson
-
63DAY 33 HOURS
Managing Windows Networking
-
64Windows security and DeploymentVideo lesson
-
65Windows security and DeploymentVideo lesson
-
66Windows security and DeviceVideo lesson
-
67Windows security and DeviceVideo lesson
-
68Windows security and DeviceVideo lesson
-
69DAY 13 HOURS
-
70Comptia N+3 HOURS
Kerberos: A popular open-source authentication protocol that is based on a time-sensitive ticket-granting system.
TGT: (Ticket-Granting Ticket) Used in Kerberos. It is an encrypted file requested from a Ticket-Granting Server that is only valid for a short time to access network services.
TGS: (Ticket-Granting Server) Used by Kerberos. It is the logical key distribution center and functions as a trusted third party to issue Ticket-Granting Tickets.
-
71MOD 15-17 Cisco junior CybersecurityAssignment
-
72QUIZ Network +3 questions
-
73AAA3 HOURS
-
74AAAVideo lesson
-
75AAAVideo lesson
-
76DAY 23 HOURS
Wireless Security
-
77Port Security3 HOURS
Port Security
Windows Firewall
Wireless Security
-
78Port and WIFI SecurityVideo lesson
-
79Port and WIFI SecurityVideo lesson
-
80Port and WIFI SecurityVideo lesson
-
81DAY 33 HOURS
Windows Firewall
-
82Firewall security3 HOURS
Windows Firewall
Wireless Security
-
83Firewall securityVideo lesson
-
84Firewall securityVideo lesson
-
85Firewall securityVideo lesson
-
86RÉSUMÉ CREATION 1Video lesson
-
87RÉSUMÉ CREATION 2Video lesson
-
88RÉSUMÉ CREATION 3Video lesson
-
89RÉSUMÉ CREATION 4Video lesson
-
90RÉSUMÉ CREATION 5Video lesson
-
91RÉSUMÉ CREATION 6Video lesson
-
92RÉSUMÉ CREATION 7Video lesson
-
93RÉSUMÉ CREATION 8Video lesson
-
94RÉSUMÉ CREATION 9Video lesson
-
95RÉSUMÉ CREATION 10Video lesson
-
96RÉSUMÉ CREATION 11Video lesson
-
97RÉSUMÉ CREATION 12Video lesson
-
98RÉSUMÉ CREATIONAssignment
-
105DAY 13 HOURS
Cloud and Virtualization Techniques
-
106Comptia N+3 HOURS
Virtualization: A technology through which one or more simulated computing devices run within a physical computer.
Hypervisor: The software or firmware that creates a virtual machine on the host hardware.
-
107MOD 1-8 CCST (NET DEF)Assignment
-
108QUIZ SEC +3 questions
-
109Virtualization3 HOURS
-
110Virtualization3 HOURS
-
111VirtualizationVideo lesson
-
112DAY 2CLOUD CONCEPT
Infrastructure
Software
Platform
Identity
Network
-
113Cloud Concept3 HOURS
Cloud computing is a model for providing or purchasing off-premise computing services over the Internet.
-
114Cloud ConceptVideo lesson
-
115Cloud ConceptVideo lesson
-
116DAY 33 HOURS
MITRE ATTACK FRAMEWORK
-
117IN class AcivityVideo lesson
-
118In class ActivityVideo lesson
-
119DAY 1Network Management•Monitor Networks•Document the Network•Establish Baselines•Optimize Network Performance•Ensure Business Continuity
-
120Comptia N+3 HOURS
Network Management
Monitoring vs Analyzing
-
121Network ManagementVideo lesson
-
122MOD 9-11 CCST (NET DEF)Assignment
-
123QUIZ SEC+3 questions
-
124Day 23 HOURS
Security and risk management
-
125Security and Risk Management3 HOURS
Security and Risk Management
-
126Security and Risk ManagementVideo lesson
-
127Security and Risk ManagementVideo lesson
-
128Security and Risk ManagementVideo lesson
-
129DAY 13 HOURS
-
130Identify, analyze, and prioritize Business Continuity (BC) requirements3 HOURS
-
131Go to https://www.classmarker.com/online-test/start/user-info/?quiz=bkf5f971a0065a5dQuiz
-
132Determine data security controlsVideo lesson
-
133Determine data security controlsVideo lesson
-
1341.Develop, document, and implement security policy, standards, procedures and guidelines3 HOURS
-
135Identify, analyze, and prioritize Business Continuity (BC) requirementsVideo lesson
Identify, analyze, and prioritize Business Continuity (BC) requirements
-
136Day 23 HOURS
Asset Security
-
137Asset Security3 HOURS
Asset Security
-
138SEC+3 questions
-
139Security Architecture and EngineeringVideo lesson
-
140Security Architecture and EngineeringVideo lesson
-
141Security Architecture and EngineeringVideo lesson
-
142DAY 33 HOURS
Assess and mitigate vulnerabilities in mobile systems
-
143Assess and mitigate vulnerabilities in embedded devices3 HOURS
Assess and mitigate vulnerabilities in embedded devices
-
144SEC+3 questions
-
145Asess and mitigate VulnerabilityVideo lesson
-
146Assess and mitigate VulnerabilityVideo lesson
-
147Assess and mitigate VulnerabilityVideo lesson
-
148Assess and mitigate VulnerabilityPreview Video lesson
-
149DAY 13 HOURS
Communication and Network Security
-
150Communication and Network Security3 HOURS
Communication and Network Security
-
151CCST CYBER THREAT MANAGEMENTAssignment
-
152CCST CYBER THREAT MANAGEMENTAssignment
-
153Communication and NetworksVideo lesson
-
154Communication and NetworksVideo lesson
-
155Communication and NetworksVideo lesson
-
156Day 23 HOURS
Identity and Access Management (IAM)
-
157Identity and Access Management (IAM)3 HOURS
Identity and Access Management (IAM)
-
158Identity and Access ManagementVideo lesson
-
159Identity and Access ManagementVideo lesson
-
160Identity and Access ManagementVideo lesson
-
Cyber Security
₦300,000
-
What is Prerequisite coursesA prerequisite is a specific course that you must complete before you can take another course at the next grade level.