This certificate course in Cybersecurity Fundamentals is designed to prepare you in developing entry-level workforce skills and the knowledge and ability to protect and defend electronic network systems from cyberattacks.
As you are no doubt aware, cybercrime is one of the most significant and evolving threats to our ever-changing digital environment. Add to this the reality that cyberattacks themselves are continually evolving, changing, becoming more sophisticated in challenging technical defenses. Not only is information theft the most expensive and fastest-rising consequence of cybercrime, but recent trends indicate that threat actors want to disrupt or even destroy organizational network systems. It's not surprising then that cybersecurity practitioners are in demand everywhere. A career in cybersecurity is highly interesting and well suited to innovative problem-solvers who enjoy lifelong learning in a professional role.
Topics in this course will cover cybersecurity best practices, security principles that all cybersecurity practitioners align with, a risk analysis framework, network security controls, cybersecurity hygiene, and mitigation strategies to reduce cybersecurity threats.
You will not be expected to learn software programming in this course. If this is something you are interested in, there are many programs available and this is an areas best considered in relation to your personal goals. What Cybersecurity Fundamentals will provide are the basics and an entrance to opportunities in the cybersecurity field, such as the position of Information Security Analyst.
By the end of the course, students will be able to:
- Define cybersecurity and its importance in today's digital world.
- Compare and examine the various cybersecurity roles and related responsibilities.
- Define the three security principles and their importance in establishing a cybersecurity program.
- Discuss the NIST Cybersecurity Framework and its importance in establishing a cybersecurity program.
- Explain how the concept of risk is applied to cyber security.
- Compare the three types of networks and their architecture.
- Explain the importance of port scanning and vulnerability testing of network security and infrastructure devices.
- Discuss the importance of cybersecurity controls in cyber defense.
- Describe the difference between an event, adverse event and a security incident.
- Assess the NIST CyberSecurity Framework functions as basic cyber hygiene.
- Categorize cyber threats by type and capability.
- Demonstrate an understanding of mitigation strategies used to protect against three common cyber threats.
If you are a student with a documented disability and have not voluntarily disclosed the nature of your disability so that we may coordinate the accommodations you need, you are invited to contact the Disability Support Services Office (DSSO) in 'Ilima 107, ph. (808)734-9552, or email email@example.com for assistance. For students whose primary disability is Deaf or hard of hearing, contact the Kapi'olani Community College Deaf Center, ph. (808)734-9210, (808)447-3145/ (808)447-3141 (videophone), or email firstname.lastname@example.org.
Please note: Due to the COVID-19 health and safety requirements, ZOOM or phone appointment will replace face to face meetings until further notice. You will need to contact Kapi'olani CC's DSSO or Deaf Center to request accommodations in a Kapi'olani CC course even if you've already registered or are receiving services at another UH campus's disability support program.
100% refund: Notification to Non-Credit Registration made 10 business days or more prior to start of course.
50% refund: Notification to Non-Credit Registration made 5-9 business days prior to start of course.
0% refund: Notification to Non-Credit Registration made less than 5 business days prior to start of course.