Cyber Security
Course Syllabus
Prerequisite of being at Infrastructure Technician / CompTIA A+ level
Learners will cover the following modules in this course:
LPI Linux Essentials – 70 hours
LPI Linux Essentials can lead to LPI Professional Development Certificate (PDC).
Cisco Cyber Essentials – 28 hours
Cisco Cloud Security – 42 hours
Cisco Cloud Security can lead to a Certificate of Cloud Security Knowledge (CCSK).
Course Structure
Linux Essentials
Linux adoption continues to rise world-wide as individual users, Government entities and industries ranging from automotive to space exploration, embrace open-source technologies. This expansion of open source in enterprise is redefining traditional Information and Communication Technology (ICT) job roles to require more Linux skills. Whether you’re starting your career in open source, or looking for advancement, independently verifying your skill set can help you stand out to hiring managers or your management team.
Linux is also fundamental to all cyber security systems and is vital knowledge for roles within the Cyber Security sector.
The Linux Community and a Career in Open Source – 7 hours
- Linux Evolution and Popular Operating Systems
- Major Open-Source Applications
- Open-Source Software and Licensing
- ICT Skills and Working in Linux
Finding Your Way on a Linux System – 14 hours
- Command Line Basics
- Using the Command Line to Get Help
- Using Directories and Listing Files
- Creating, Moving and Deleting Files
The Power of the Command Line – 14 hours
- Archiving Files on the Command Line
- Searching and Extracting Data from Files
- Turning Commands into a Script
The Linux Operating System – 18 hours
- Choosing an Operating System
- Understanding Computer Hardware
- Where Data is Stored
- Your Computer on the Network
Security and File Permissions – 17 hours
- Basic Security and Identifying User Types
- Creating Users and Groups
- Managing File Permissions and Ownership
- Special Directories and Files
Course Structure
Linux Essentials
Linux adoption continues to rise world-wide as individual users, Government entities and industries ranging from automotive to space exploration, embrace open-source technologies. This expansion of open source in enterprise is redefining traditional Information and Communication Technology (ICT) job roles to require more Linux skills. Whether you’re starting your career in open source, or looking for advancement, independently verifying your skill set can help you stand out to hiring managers or your management team.
Linux is also fundamental to all cyber security systems and is vital knowledge for roles within the Cyber Security sector.
The Linux Community and a Career in Open Source – 7 hours
- Linux Evolution and Popular Operating Systems
- Major Open-Source Applications
- Open-Source Software and Licensing
- ICT Skills and Working in Linux
Finding Your Way on a Linux System – 14 hours
- Command Line Basics
- Using the Command Line to Get Help
- Using Directories and Listing Files
- Creating, Moving and Deleting Files
The Power of the Command Line – 14 hours
- Archiving Files on the Command Line
- Searching and Extracting Data from Files
- Turning Commands into a Script
The Linux Operating System – 18 hours
- Choosing an Operating System
- Understanding Computer Hardware
- Where Data is Stored
- Your Computer on the Network
Security and File Permissions – 17 hours
- Basic Security and Identifying User Types
- Creating Users and Groups
- Managing File Permissions and Ownership
- Special Directories and Files
Cyber Essentials
This module is designed for learners who are interested in pursuing more advanced studies in the field of cybersecurity. The curriculum explores the characteristics of, and tactics used, by cyber criminals. It then delves into the technologies, products and procedures cybersecurity professional use to combat cybercrime.
Principles – 7 hours
- The characteristics of criminals and experts in the cybersecurity world.
- How the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures
- The tactics, techniques and procedures used by cyber criminals.
Technologies – 11 hours
- How technologies, products and procedures are used to protect confidentiality.
- How technologies, products and procedures are used to ensure integrity.
- How technologies, products, and procedures provide high availability.
In Practice – 10 hours
- How cybersecurity professionals use technologies, processes and procedures to defend all components of the network.
- The purpose of laws related to cybersecurity.
Cloud Security
With more companies moving to the cloud, the need for cloud security is becoming increasingly apparent. Due to this, the IT and cybersecurity industries have seen an increase in demand for knowledgeable experts to help companies stay secure in the cloud.
This module provides a broad overview of cloud security and allows students to gain critical insights into how security issues change in the cloud, including data security, key management and identity and access management.
The Certificate of Cloud Security Knowledge (CCSK) is targeted towards professionals working in IT and cybersecurity.
Cloud Architecture – 7 hours
- Understand the components of cloud infrastructure
- Assess the security implications of virtual networks and workloads
- Learn the security advantages and disadvantages of working with cloud infrastructure
- Evaluate how to secure the cloud management plane
- Learn how to manage business continuity for cloud computing
Infrastructure Security for Cloud – 7 hours
- Understand the components of cloud infrastructure
- Assess the security implications of virtual networks and workloads
- Learn the security advantages and disadvantages of working with cloud infrastructure
- Evaluate how to secure the cloud management plane
- Learn how to manage business continuity for cloud computing
Managing Cloud Security and Risk – 7 hours
- The implications of cloud on governance, with a focus on contracts and controls
- How cloud affects enterprise risk management
- Some top-level legal areas cloud tends to affect (but not legal advice)
- Managing compliance and audits for cloud deployments
- Tools from the Cloud Security Alliance to help assess and manage risk
Data Security for Cloud Computing – 7 hours
- Understand the different cloud storage models
- Define security issues for data in the cloud
- Assess the role and effectiveness of access controls
- Learn different cloud encryption models
- Understand additional data security options
- Introduce data security lifecycle
Application Security and Identity Management for Cloud Computing – 7 hours
- Discover how application security differs in cloud computing
- Review secure software development basics and how those change in the cloud
- Leverage cloud capabilities for more secure cloud applications
Cloud Security Operations – 7 hours
- How to select cloud providers
- The advantages and disadvantages of security as a service
- The different major security as a service categories
- How to respond to security incidents in the cloud
- The security issues of technologies related to cloud computing: Big Data, mobile, serverless, IoT
- Security as a service
Delivery Structure
Content | Start Week | Tutor Hours | Mode of Delivery |
LINUX ESSENTIALS | |||
The Linux Community & Popular OSs | 1 | 7 | Remote / Blended |
Finding Your Way on a Linux System | 1 | 14 | Remote / Blended |
The Power of the Command Line | 2 | 14 | Remote / Blended |
The Linux Operating System | 3 | 18 | Remote / Blended |
Security and File Permissions | 4 | 17 | Remote / Blended |
Linux Essentials Total | 5 Weeks | 70 | |
CYBER ESSENTIALS | |||
Part 1 – Principles | 7 | Remote / Blended | |
Part 2 – Technologies | 6 | 11 | Remote / Blended |
Part 3 – In Practice | 7 | 10 | Remote / Blended |
Cyber Essentials Total | 2 Weeks | 28 | |
CLOUD SECURITY | |||
Cloud Architecture | 8 | 7 | Remote / Blended |
Infrastructure Security for Cloud | 8 | 7 | Remote / Blended |
Managing Cloud Security and Risk | 9 | 7 | Remote / Blended |
Data Security for Cloud Computing | 9 | 7 | Remote / Blended |
Application Security and Identity Management for Cloud Computing | 10 | 7 | Remote / Blended |
Cloud Security Operations | 10 | 7 | Remote / Blended |
Cloud Security Total | 3 weeks | 42 | |
Course Total | 10 Weeks | 140 Hours |
Learners will also be expected to spend an average of 5 hours per week in Learner led research and mini-project work.