Short Course
in Cyber Security
Introduction
The NCC Short Course in Cyber Security provides a comprehensive foundation in securing networks, systems, and information through practical and theoretical learning. Perfect for IT professionals, this course equips participants with essential skills to tackle modern security challenges.
Short Course in Cyber Security
Course Title and Duration
Duration:
Flexible
Start Dates:
Registration throughout the year
Awarding Institution and Language of Study
Awarding Institution:
NCC Education
Language of Study:
English
Programme Overview
The Cyber Security short course provides participants with a comprehensive understanding of the fundamental principles, underlying theory, and practical skills necessary to secure information and networks. It covers cryptographic algorithms and provides practical examples of breaking codes, offering learners the skills needed to assess security risks in computer networks and the technologies that can mitigate these risks. The course focuses on network security, cryptography, and various techniques to secure information systems effectively.
Entry Requirements
As a minimum, participants should have:
- Good IT knowledge
- Good understanding of English
Funding
Accepted by the HRDF for funding in Malaysia.
Related National Occupational Standards
Manage IT/technology security management processes, requirements, and systems.
Programme Structure
The course comprises multiple topics, including:
- Cryptography Fundamentals:
- Cryptographic algorithms including AES block cipher, RSA public-key code, and SHA hash algorithm.
- Public-Key Infrastructure (PKI):
- The Public-Key Infrastructure, Certification Authorities, and Digital Signatures.
- Web Security:
- Browser security and SSL/TLS for encrypted browsing.
- Email Security:
- PGP and S/MIME for encrypted and authenticated email.
- Data Protection:
- File, disk, and portable encryption technologies.
- Vulnerability Assessment:
- Terms and tools for vulnerability assessment, including port scanners and password crackers.
- Authentication:
- Methods like passwords, multi-factor authentication, and biometrics.
- Access Control:
- Packet filtering, access control lists, NAT, and IDS.
- Firewalls:
- Firewall architectures and their limitations, including the DMZ firewall.
- VPN:
- Virtual Private Network technologies and issues.
- Remote Access:
- Technologies for remote access, such as remote desktops and web applications.
- Wireless Security:
- Security for wireless networks (WEP, WPA, WPA2) and secure network architectures for wireless deployments.
Learning & Teaching Strategies
The program employs a blend of online learning methods, including:
- Video Lectures: Pre-recorded lectures that provide theoretical knowledge and practical insights.
- Practical Exercises: Hands-on activities to apply learned concepts in simulated environments.
- Discussion Forums: Platforms to engage with peers and instructors, fostering a collaborative learning environment.
- Assessments: Continuous assessments to gauge understanding and mastery of topics.
Learning Outcomes:
Upon successful completion of the course, students will be able to:
- Understand and explain cryptographic fundamentals and public-key infrastructure.
- Assess web and email security protocols and apply necessary protections.
- Implement data protection measures, including encryption techniques.
- Perform vulnerability assessments using appropriate tools and methods.
- Utilize various authentication mechanisms to secure systems.
- Understand access control mechanisms and firewall architectures.
- Configure and manage VPNs and remote access technologies for secure communications.
- Implement wireless security protocols to protect against network vulnerabilities.
Support for Student Learning:
Students will have access to:
Learning Resources
Comprehensive materials including online articles, e-books, and tutorials.
Discussion Forums
Platforms for peer interaction and knowledge sharing.
Instructor Support
Guidance and feedback from experienced instructors.
Total Qualification Time:
The course content is flexible, designed to cater to a range of learning paces and styles.
Conclusion
The NCC Short Course in Cyber Security equips learners with essential skills and knowledge to safeguard digital systems and networks against evolving threats. By covering key areas such as cryptography, authentication, vulnerability assessment, and wireless security, the course prepares participants for real-world challenges in the cyber security field. Graduates will be well-prepared to apply their skills in securing information systems and pursuing further opportunities in this rapidly growing industry.