Short Course in Cyber Security

7

Course Overview

The Cyber Security short course provides participants with a comprehensive understanding of the fundamental principles, underlying theory, and practical skills necessary to secure information and networks. It covers cryptographic algorithms and provides practical examples of breaking codes, offering learners the skills needed to assess security risks in computer networks and the technologies that can mitigate these risks. The course focuses on network security, cryptography, and various techniques to secure information systems effectively.

Entry Requirements

As a minimum, participants should have:

  • Good IT knowledge
  • Good understanding of English

Funding
Accepted by the HRDF for funding in Malaysia.

Related National Occupational Standards
Manage IT/technology security management processes, requirements, and systems.

Learning Outcomes

Upon successful completion of the course, students will be able to:

  • Understand and explain cryptographic fundamentals and public-key infrastructure.
  • Assess web and email security protocols and apply necessary protections.
  • Implement data protection measures, including encryption techniques.
  • Perform vulnerability assessments using appropriate tools and methods.
  • Utilize various authentication mechanisms to secure systems.
  • Understand access control mechanisms and firewall architectures.
  • Configure and manage VPNs and remote access technologies for secure communications.
  • Implement wireless security protocols to protect against network vulnerabilities.

Syllabus Content

The course comprises multiple topics, including:

  • Cryptography Fundamentals:
    • Cryptographic algorithms including AES block cipher, RSA public-key code, and SHA hash algorithm.
  • Public-Key Infrastructure (PKI):
    • The Public-Key Infrastructure, Certification Authorities, and Digital Signatures.
  • Web Security:
    • Browser security and SSL/TLS for encrypted browsing.
  • Email Security:
    • PGP and S/MIME for encrypted and authenticated email.
  • Data Protection:
    • File, disk, and portable encryption technologies.
  • Vulnerability Assessment:
    • Terms and tools for vulnerability assessment, including port scanners and password crackers.
  • Authentication:
    • Methods like passwords, multi-factor authentication, and biometrics.
  • Access Control:
    • Packet filtering, access control lists, NAT, and IDS.
  • Firewalls:
    • Firewall architectures and their limitations, including the DMZ firewall.
  • VPN:
    • Virtual Private Network technologies and issues.
  • Remote Access:
    • Technologies for remote access, such as remote desktops and web applications.
  • Wireless Security:
    • Security for wireless networks (WEP, WPA, WPA2) and secure network architectures for wireless deployments.

Learning & Teaching Strategies

The program employs a blend of online learning methods, including:

  • Video Lectures: Pre-recorded lectures that provide theoretical knowledge and practical insights.
  • Practical Exercises: Hands-on activities to apply learned concepts in simulated environments.
  • Discussion Forums: Platforms to engage with peers and instructors, fostering a collaborative learning environment.
  • Assessments: Continuous assessments to gauge understanding and mastery of topics.

Assessment Strategy

Assessment includes:

Coursework
Various practical assignments and projects.

Examinations
Formal exams to test understanding of theoretical concepts.

Support for Student Learning:

Students will have access to:

Learning Resources
Comprehensive materials including online articles, e-books, and tutorials.

Discussion Forums
Platforms for peer interaction and knowledge sharing.

Instructor Support
Guidance and feedback from experienced instructors.

Total Qualification Time:

The course content is flexible, designed to cater to a range of learning paces and styles.

Conclusion

The NCC Short Course in Cyber Security equips learners with essential skills and knowledge to safeguard digital systems and networks against evolving threats. By covering key areas such as cryptography, authentication, vulnerability assessment, and wireless security, the course prepares participants for real-world challenges in the cyber security field. Graduates will be well-prepared to apply their skills in securing information systems and pursuing further opportunities in this rapidly growing industry.

Entry Requirements

Assessment Strategy