Introduction to Cybersecurity 2.
1
Overview
December 2017
Why Cybersecurity?
Everyone Needs to Skill Shortage Hot Jobs
Know
Even the grandmas on Facebook A report from Frost & Sullivan 10 IT skills that Employers need in
need to know and practice basic and (ISC)2 found that the global 2017 – cybersecurity is rated top 3
security hygiene, because what cybersecurity workforce will skills that will be in high demand for
happens everywhere on the Internet have more than 1.5 million 2017. Average salary for entry level
can eventually affect us all. unfilled positions by 2020. jobs range from US$64k-$113k p.a.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Source: Why Cybersecurity Starts at Home Source: report Source: CIO from IDG , Indeed.com
Introduction
to Cybersecurity
Course Overview
The Introduction to Cybersecurity course explores cyber trends,
threats and staying safe in cyberspace, and protecting personal
and company data.
Benefits
Learn how to protect your personal data and privacy online and in
social media, and why more and more IT jobs require
cybersecurity awareness and understanding.
Features
Learning Components
Target Audience: Secondary and 2-Year college students, general
• 5 modules audience
• Interactive and instructional content Prerequisites: None
Instructor Training Required: No
• 8 Activities and 7 lab exercises that reinforce learning
Languages: Chinese-S, English (2.1), French, German, Hebrew,
• 4 quizzes and 1 final exam Italian, Japanese, Spanish, Portuguese
• Links to related resources Course Delivery: Instructor-led or Self-paced
Estimated Time to Complete: 15 hours
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
What’s Changed In 2.1?
• Minor content updates
• Recent security breach example
• Add newly discovered wireless networks security
vulnerability – KRACK
• Update NIST standard for password
• Improve course structure caters to public audience
• Remove irrelevant content and terminologies
• Simplifies certification references
• Improved Accessibility compliant to WCAG 2.0
• Bug fixes and link refreshes
• Refer to Release Notes for details
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Course Outline
Chapter Chapter Titles Summary Description
• Learn the need for and importance of cybersecurity.
1 The Need for Cybersecurity • Understand the characteristics and value of personal data, and data
within an organization.
Attacks, Concepts and • Recognize the characteristics and operation of a cyber attack.
2 Techniques • Interpret the trends in the cyber threat landscape.
• Understand how to protect devices from threats.
3 Protecting Your Data and Privacy
• Master how to safeguard your privacy.
• Learn techniques to protect organizations from cyber attacks.
4 Protecting the Organization •
•
Recognize the behavior-based approach to cybersecurity.
Explain Cisco’s approach to cybersecurity.
• Understand legal and ethical issues in cybersecurity
Will Your Future Be in
5 Cybersecurity?
• Explore the opportunities for pursuing an education and a career in
cybersecurity.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Module 1: The Need for Cybersecurity
Learn what cybersecurity is and why the
demand for cybersecurity professionals is
growing.
Module 1 presents:
• What your online identity and data is,
where it is, and why it is of interest to
cyber criminals.
• What organizational data is, and why it
must be protected.
• What cyber warfare is and why
organizations, nations, and governments
need cybersecurity professionals to
protect their citizens and infrastructure. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Module 2: Attacks, Concepts and Techniques
Learn how a cybersecurity professional
analyzes a cyberattack.
Module 2 details:
• Security vulnerabilities and the different
types of vulnerabilities and malware.
• The techniques used by attackers to
infiltrate a system.
• The characteristics and operation of a
cyber attack.
• The trends in the cyber threat landscape.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Module 3: Protecting Your Data and Privacy
Become aware of your personal devices and
data.
Module 3 covers:
• Tips for protecting your personal devices
and data by creating strong passwords
and using wireless networks safely.
• Authentication techniques helping you
maintain your data securely with tips
about what to do and what not to do
online.
• Protecting devices from threats.
• Safeguarding your privacy. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Module 4: Protecting The Organization
Learn about the technologies, processes, and
best practices used when protecting an
organization’s network.
Module 4 presents:
• Equipment, data, and the commonly used
security terms such as botnets, the kill chain,
and behavior-based security.
• Cisco’s approach to cybersecurity using a
CSIRT team and a security playbook.
• Techniques for protecting organizations from
cyber attacks.
• The behavior-based approach to cybersecurity.
• Cisco’s approach to cybersecurity.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Module :5 Will Your Future Be in
Cybersecurity?
Explore educational paths towards
certifications with the Cisco Networking
Academy (NetAcad).
Module 5 summarizes:
• Understand legal and ethical Issues
in Cybersecurity
• Explore the opportunities for
pursuing an education and a career
in cybersecurity.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Students Enrollment and Support
Visit the Course information page on Cisco
NetAcad.com to enroll in the self-paced course.
If you need assistance, post questions on the Cisco
Networking Academy Facebook page
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Instructors Enrollment and Support
Enroll students and teach Introduction to Cybersecurity
in their classrooms through the same process used for
other NetAcad courses
No instructor training required
If you need assistance, contact your Academy Support
Center (ASC)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Instructor Resources
https://www.netacad.com/group/resources/cybersecurity/2.1
PPT
Instructor Powerpoints,
S&S
Scope & Sequence
Intro to Cyber security Document
2.1 Overview and Video
FAQ
Frequently Asked
Plus
Additional information &
Questions resources
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
End-of-Life for Introduction to Cybersecurity 2.0
Course Language Last Class Start Date
Introduction to Cybersecurity 2.0 English April 1, 2018
All other available languages are not EOL.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14