Essentials of Cybersecurity
Overview
As a cybersecurity professional, you know that hackers and cyberterrorists have pushed corporations to new levels of alert these days, creating the need for heightened security to protect both infrastructure and data.
And undoubtedly, you also know that increasing your understanding of risk assessments and current cyber trends is an ongoing process. It’s essential to maintain skills to combat threats, prevent attacks, and perform remediation activities.
44.75 PDUs | 8 Continuing Education Units
80 Military Clock Hours | 10 Military Clock Hours Per Week
Who Should Register?
The Essentials of Cybersecurity course is designed for professionals who are developing skills on the management side of cybersecurity, those charged with protecting the hard or soft assets within an organization and those looking to transition into the cyber field. The eight-week course is applicable to students with a cyber or IT background and aspiring cyber/IT managers.
Are you an experienced cybersecurity professional?
You may be eligible to enroll directly in the Mastering Cybersecurity/Security+ course. Students should have an understanding of basic concepts in information technology (IT). Work experience in IT is recommended. Students who are new to IT should begin with Essentials of Cybersecurity.
Course offerings and associated prices are subject to change without prior notice. Pricing for multi-course certificate programs varies depending on course selection. View the Professional Education Catalog for more information on the courses and programs.
What You’ll Study
Upon completion of this course, you will be able to:
- Describe security and the investigation phase.
- Identify threats, attacks, and current issues in cybersecurity.
- Compare information security policies, standards, and procedures.
- Define firewalls, intrusion detection systems, cryptography, and encryption.
- Discuss logical physical security designs.
- Explain the role of risk management, identification, and mitigation selection in cybersecurity.
- Describe the implementation and maintenance of security.
Curriculum
8 Week Course
Introduction to Security and Security Investigation Phase
- Identify the reasons for investigating your organization’s vulnerabilities and securities
- Describe IS history and the need for security
- Describe the Systems Development Life Cycle (SDLC)
- Identify the differences between threats and attacks
- Discuss security ethics
Introduction to Security and Security Investigation Phase, continued
- Identify the reasons for investigating your organization’s vulnerabilities and securities
- Describe IS history and the need for security
- Describe the Systems Development Life Cycle (SDLC)
- Identify the differences between threats and attacks
- Discuss security ethics
Security Analysis
- Explain the process of analyzing a security system project
- Describe risk identification and assessment
- Define risk management, control, and mitigation
Security Analysis, continued
- Explain the process of analyzing a security system project
- Describe risk identification and assessment
- Define risk management, control, and mitigation
Logical and Physical Security Design
- Describe the process of designing a security system
- Explain IS security policies and procedures
- Discuss IS security design models and physical security
- Define cryptography, encryption, antivirus, and spam
- Summarize incident response and disaster recovery
Logical and Physical Security Design, continued
- Describe the process of designing a security system
- Explain IS security policies and procedures
- Discuss IS security design models and physical security
- Define cryptography, encryption, antivirus, and spam
- Summarize incident response and disaster recovery
Implementation and Maintenance of Security
- Discuss industry standard processes and procedures used to implement and maintain a security system
- Detail project management techniques specific to IS security
- Describe implementation issues
- Explain organizational security functions and considerations
Implementation and Maintenance of Security, continued
- Discuss industry standard processes and procedures used to implement and maintain a security system
- Detail project management techniques specific to IS security
- Describe implementation issues
- Explain organizational security functions and considerations
If you’re going to pay by credit card, you can either get started with installment payments or pay in full. Just let your enrollment representative know the option that works best for you.
Corporate Tuition Assistance
-
Corporate TA
Corporate tuition assistance is paid by your employer. You will need to provide appropriate forms for processing, prior to enrollment. Subject to employer benefit policies.
-
Deferred Corporate TA
Pay tuition now and have your employer reimburse you. Additional documentation will be needed to process this payment. Subject to employer benefit policies.
Military Benefits
Active Duty
Villanova offers a 15% savings, per certificate course, to active-duty servicemembers, Guardsmen and Reservists (upon verification of military status).
Veterans
Villanova offers a 15% savings, per certificate course to veterans (upon verification of military status). You may also use your Department of Veterans Affairs (VA) education benefits for many of Villanova’s 100% online non-credit programs, based upon your individual eligibility.
Spouses and Dependents
Villanova offers a 15% savings, per certificate course, to active-duty servicemembers, veterans, Guardsmen, Reservists and their spouses and dependents (upon verification of military status).