Virginia Beach Cybersecurity STEM Trifecta 2019
Courses listed below Network Essentials, Cybersecurity Essentials, and CCNA CyberOPS
Videos will be updated with Links within the information below on a daily basis. If you have any questions or concerns, please let me know.
Brian Crump firstname.lastname@example.org
Network Essentials Training Review
The goal of this course is to introduce the student to networking, network service and device configuration, and Cisco routers and switches. The online course materials will assist the student in communicating their knowledge and desire to learn more about networking and pursue a networking career.
Upon completion of the Networking Essentials v1.0 course, students will be able to perform the following tasks:
- Explain how end-user devices and local networks interact with the global Internet.
- Explain the requirements for network connectivity.
- Build a small network using an integrated network router.
- Explain the importance of IP addressing.
- Explain how the protocols of the TCP/IP suite enable network communication.
- Configure an integrated wireless router and wireless clients to connect securely to the Internet.
- Configure basic network security.
- Build a simple computer network using Cisco devices.
- Troubleshoot common network issues found in home and small business networks.
Labs are available for you to practice via competitions.stanly.edu under class name:
VB Cyber Security Challenge 2018-2019
To successfully prepare for the Network Essentials Portion of the Cybersecurity Competition, you should reserve the appropriate amount of time to complete all of the Network + Pod Labs. If you can’t access the competitions website to login successfully, please let your mentor know immediately and have your mentor email me with all student names, login names, and the temporary password they would like to set for all account, along with School Name.
Cybersecurity Essentials Training Review
Cybersecurity Essentials 1.0 covers foundation knowledge and essentials skills in all security domains in the cyber world - information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques use in protecting businesses. Upon completion of the Cybersecurity Essentials 1.0 course, students will be able to perform the following tasks:
- Describe the characteristics of criminals and professionals in the cybersecurity realm.
- Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
- Describe the tactics, techniques and procedures used by cyber criminals.
- Describe how technologies, products and procedures are used to protect confidentiality.
- Describe how technologies, products and procedures are used to ensure integrity.
- Describe how technologies, products, and procedures provide high availability.
- Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.
- Explain the purpose of laws related to cybersecurity.
There are no labs available for you to practice via competitions.stanly.edu. You will need to review the Cybersecurity Essentials Curriculum via netacad.com both the hands on labs and the packet tracers for lab practice.
If you do not have access to the netacad cybersecurity essentials course via netacad.com, please let your mentor know immediately and have your mentor sign you up for that course
CCNA Cyberops Training Review
CCNA Cybersecurity Operations v1.1 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Upon completion of the CCNA Cybersecurity Operations v1.1 course, students will be able to perform the following tasks:
- Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
- Explain the features and characteristics of the Linux Operating System.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.