Essentials of Cybersecurity

Villanova University

How long?

  • online
  • on demand

Villanova University

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

Read more about Project management

Whether it is developing software programs or launching a new clothing line, taking any project from start to finish requires the application of proje...

Reviews

Comprehensive course analysis

Unbiased reviews from past participants
Global companies alumni of this course worked for
Positions of participants who took this course
Countries where most past participants are from
FREE
Individual needs analysis

Who should attend

The Essentials of Cybersecurity course is designed for professionals who are developing skills on the management side of cybersecurity, those charged with protecting the hard or soft assets within an organization and those looking to transition into the cyber field. The eight-week course is applicable to students with a cyber or IT background and aspiring cyber/IT managers.

About the course

As a cybersecurity professional, you know that hackers and cyberterrorists have pushed corporations to new levels of alert these days, creating the need for heightened security to protect both infrastructure and data.

And undoubtedly, you also know that increasing your understanding of risk assessments and current cyber trends is an ongoing process. It’s essential to maintain skills to combat threats, prevent attacks, and perform remediation activities.

What You’ll Study

Upon completion of this course, you will be able to:

  • Describe security and the investigation phase.
  • Identify threats, attacks, and current issues in cybersecurity.
  • Compare information security policies, standards, and procedures.
  • Define firewalls, intrusion detection systems, cryptography, and encryption.
  • Discuss logical physical security designs.
  • Explain the role of risk management, identification, and mitigation selection in cybersecurity.
  • Describe the implementation and maintenance of security.

Curriculum

Introduction to Security and Security Investigation Phase

  • Identify the reasons for investigating your organization’s vulnerabilities and securities
  • Describe IS history and the need for security
  • Describe the Systems Development Life Cycle (SDLC)
  • Identify the differences between threats and attacks
  • Discuss security ethics

Curriculum

Introduction to Security and Security Investigation Phase

  • Identify the reasons for investigating your organization’s vulnerabilities and securities
  • Describe IS history and the need for security
  • Describe the Systems Development Life Cycle (SDLC)
  • Identify the differences between threats and attacks
  • Discuss security ethics

Introduction to Security and Security Investigation Phase, continued

  • Identify the reasons for investigating your organization’s vulnerabilities and securities
  • Describe IS history and the need for security
  • Describe the Systems Development Life Cycle (SDLC)
  • Identify the differences between threats and attacks
  • Discuss security ethics

Security Analysis

  • Explain the process of analyzing a security system project
  • Describe risk identification and assessment
  • Define risk management, control, and mitigation

Security Analysis, continued

  • Explain the process of analyzing a security system project
  • Describe risk identification and assessment
  • Define risk management, control, and mitigation

Logical and Physical Security Design

  • Describe the process of designing a security system
  • Explain IS security policies and procedures
  • Discuss IS security design models and physical security
  • Define cryptography, encryption, antivirus, and spam
  • Summarize incident response and disaster recovery

Logical and Physical Security Design, continued

  • Describe the process of designing a security system
  • Explain IS security policies and procedures
  • Discuss IS security design models and physical security
  • Define cryptography, encryption, antivirus, and spam
  • Summarize incident response and disaster recovery

Implementation and Maintenance of Security

  • Discuss industry standard processes and procedures used to implement and maintain a security system
  • Detail project management techniques specific to IS security
  • Describe implementation issues
  • Explain organizational security functions and considerations

Implementation and Maintenance of Security, continued

  • Discuss industry standard processes and procedures used to implement and maintain a security system
  • Detail project management techniques specific to IS security
  • Describe implementation issues
  • Explain organizational security functions and considerations

Essentials of Cybersecurity at Villanova University

From  $2,095
Add coaching to your course booking

Coaching can personalize and deepen learning for you and your organization.


Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Read more about Project management

Whatever the reason you are considering taking a project management course, there are certain criteria to look for in a course. Undoubtedly, it should meet your needs. If you are a newcomer to the field, a course should provide a complete theoretical...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.