Fundamentals of Cybersecurity (X-ISS 11)
Fundamentals of Cybersecurity is an introductory course designed to give you a foundational look at the complex cybersecurity landscape and the emerging field of information technology (IT) systems security and assurance. This course will help provide you with the tools to evaluate online risks and security protocols in information processing systems.
Self-directed online course
This self-directed online course consists of the following 10 modules:
1. Course Orientation (introductory module)
2. Introduction to Cybersecurity
This module introduces the term cybersecurity. The need for a holistic and multi-level approach to securing systems and/or networks through defense of depth is also discussed as well as the financial and reputational consequences of security breaches.
3. IT Governance
This module focuses on IT governance and its importance to organizations. The module also introduces COBIT 2019, an IT governance framework and how it creates value for organizations.
4. IT Risk Management
This module focuses on IT risk management, its importance, IT risk management concepts, and the steps involved in a risk management process.
5. Incident Response and Disaster Recovery
This module focuses on incident response and recovery from IT disasters. While cybersecurity incident response focuses on events that impact computer systems and personal information, disaster recovery tends to focus on larger, organization-wide events, such as earthquakes, hurricanes, and terrorism. The goal of both incident response and disaster recovery is to recover from an adverse event.
6. Basic Network Concepts
This module focuses on the basic network concepts. You will be able to identify a network and its characteristics based on size, location, and purpose.
7. Network Security
This module focuses on network security. You learn how network security is defined and the importance of the cybersecurity professional’s technical skills. You will learn some of the top cyber attacks that have compromised network security and examine various network devices, controls, and methods to secure a network. Lastly, you will learn some of the basics about network vulnerabilities.
8. Types of Cyberattacks and Protection
This module focuses on cyber attacks: malicious acts by persons, groups or organizations, for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure or for destroying data or stealing confidential information. After completing the module, you should be able to identify the common impacts of cyber attacks, motivations of adversaries, as well as who the cyber attackers are. This module also provides basic tips on how to protect yourself and your company against cyber attacks.
9. Operations Security
This module focuses on four aspects of operations security: What it is, the administrative controls, the physical controls, and the best practices in storing, retaining, and destroying sensitive data.
10. IT Law and Ethics
This module focuses on legal and ethical considerations pertinent to information system security and assurance professionals. You learn how complicated cybersecurity law enforcement is, what types of intellectual property are targeted by hackers, the different laws around IT security, and the four canons of the (ISC)2Code of Ethics.
What you will be learning
• Identify career opportunities and salary ranges related to a career in cybersecurity or assurance
• Detect common cyber attacks that exploit system (software) and human vulnerabilities
• Identify practical tips to protect you from cyber attacks (system and human vulnerabilities)
• Identify some tools and techniques associated with cybersecurity “defence in depth”
• Recognize the financial and/or reputational consequences of major security breaches
• Identify strategies to protect against and respond to ransomware and denial of service attacks
• Detect actors and motivations for cyber attacks
• Identify the consequences of cyber attacks for organizations
• Define threat, vulnerability, impact, risk, and control within the IT context
• Recognize the importance of incident response and disaster recovery for organizations
• Recognize best practices for safely storing, retaining, and destroying sensitive data
• Recognize some important laws, regulations, and legal principles that affect IT security
Why you should consider a certificate in cyber security?
The demand for cybersecurity knowledge is on the rise across all types of industries. Learn the unique ability to protect and secure digital assets in one of the fastest growing technology fields in the world. Concordia University of Edmonton is proud to offer our 15-20 hour introductory to cybersecurity course that will help enhance your career with our fundamentals of cybersecurity.
Develop the skills that employers need
Cyber security professionals have a wide range of responsibilities, primarily protecting online data from being compromised.
Which path is right for you?
Cybersecurity related employment opportunities may be broken down into two major categories:
• Cybersecurity (information system security)
• Assurance (audit related)
Cybersecurity professionals focus on the protection of various Internet connected systems, which include hardware, software, and data. As such, cybersecurity professionals must be well-versed in a number of cybersecurity related domains such as risk management, incident response and disaster recovery, network security, and various aspects of operations security.
Some common cybersecurity related jobs include:
Security Analyst: These individuals may have several IT security functions which often include planning for security measures and controls, the protection of data, or the security assessment of various information systems within an organization.
Security Architect: These individuals are responsible for analysing, implementing, testing, and supporting an enterprise’s critical IT infrastructure.
Security Engineer: These professionals protect company assets from various threats, focusing on quality control within the IT infrastructure.
Chief Information Security Officer (CISO):
These high-level management executives are responsible for the successful implementation of IT security programs across an organization, as well as overseeing various IT security department operations.
Information Assurance (IA)) refers to the steps involved in protecting various systems, which typically includes servers, networks, and computers. In most organizations, information assurance professionals act as information system auditors.
The job held by professionals in these fields include making sure (providing a reasonable level of assurance) that various information systems possess the necessary ingredients to ensure that systems and data are secure, accurate, and available when needed – this concept is called the CIA Triad.
In both the cybersecurity and assurance fields, ensuring that systems and data are secure, accurate, and available when needed is referred to as the CIA Triad.
C: The “C” represents data confidentiality; in other words, making sure that the data remains secure and out of the way of hackers.
I: The “I” stands for data integrity. This means assurance professionals want to make sure that data always remains accurate, and that it does not become corrupted or changed without the proper authorizations.
A: The “A” denotes availability. This means that assurance professionals ensure that data and systems are always available to meet the needs of the organization and its employees and business partners.
The shortage of qualified cybersecurity professionals has reached critical levels of reported according to a recent report published by the International Information System Security Certification Consortium (ISC)2. https://www.isc2.org/Research
According to the (ISC)2’s most recent report (2023), it is estimated that there are currently 5.5 million unfilled cybersecurity positions globally, nearly doubling from 2.9 million in 2019. Further, (ISC)2 reports that 498,000 of those vacant positions exist within North America. If you cannot believe this astronomical cybersecurity talent shortage figure, read the full reports by the (ICS)2:
Cybersecurity Workforce Study: Looking Deeper into the Workforce Gap (2023)
Review all (ISC)2 Workforce Studies
YouTube videos related to cybersecurity
A Day in the Life of a Cybersecurity Analyst
https://www.youtube.com/watch?v=WE8O5E1RbMU
https://www.youtube.com/watch?v=wet-O_W-ezE
Register now!
Register for an Office of Extension & Culture Course.
Questions? Email us at extension@concordia.ab.ca
Course fee
$299 + GST