Short Course in Cyber Security

Short Course

in Cyber Security

Introduction

The NCC Short Course in Cyber Security provides a comprehensive foundation in securing networks, systems, and information through practical and theoretical learning. Perfect for IT professionals, this course equips participants with essential skills to tackle modern security challenges.

Short Course in Cyber Security

Course Title and Duration

Duration:

Flexible

Start Dates:

Registration throughout the year

Awarding Institution and Language of Study

Awarding Institution:

NCC Education

Language of Study:

English

Programme Overview

The Cyber Security short course provides participants with a comprehensive understanding of the fundamental principles, underlying theory, and practical skills necessary to secure information and networks. It covers cryptographic algorithms and provides practical examples of breaking codes, offering learners the skills needed to assess security risks in computer networks and the technologies that can mitigate these risks. The course focuses on network security, cryptography, and various techniques to secure information systems effectively.

Entry Requirements

As a minimum, participants should have:

  • Good IT knowledge
  • Good understanding of English

Funding

Accepted by the HRDF for funding in Malaysia.

Related National Occupational Standards

Manage IT/technology security management processes, requirements, and systems.

Programme Structure

The course comprises multiple topics, including:

  • Cryptography Fundamentals:
    • Cryptographic algorithms including AES block cipher, RSA public-key code, and SHA hash algorithm.
  • Public-Key Infrastructure (PKI):
    • The Public-Key Infrastructure, Certification Authorities, and Digital Signatures.
  • Web Security:
    • Browser security and SSL/TLS for encrypted browsing.
  • Email Security:
    • PGP and S/MIME for encrypted and authenticated email.
  • Data Protection:
    • File, disk, and portable encryption technologies.
  • Vulnerability Assessment:
    • Terms and tools for vulnerability assessment, including port scanners and password crackers.
  • Authentication:
    • Methods like passwords, multi-factor authentication, and biometrics.
  • Access Control:
    • Packet filtering, access control lists, NAT, and IDS.
  • Firewalls:
    • Firewall architectures and their limitations, including the DMZ firewall.
  • VPN:
    • Virtual Private Network technologies and issues.
  • Remote Access:
    • Technologies for remote access, such as remote desktops and web applications.
  • Wireless Security:
    • Security for wireless networks (WEP, WPA, WPA2) and secure network architectures for wireless deployments.

Learning & Teaching Strategies

The program employs a blend of online learning methods, including:

  • Video Lectures: Pre-recorded lectures that provide theoretical knowledge and practical insights.
  • Practical Exercises: Hands-on activities to apply learned concepts in simulated environments.
  • Discussion Forums: Platforms to engage with peers and instructors, fostering a collaborative learning environment.
  • Assessments: Continuous assessments to gauge understanding and mastery of topics.
  •  

Learning Outcomes:

Upon successful completion of the course, students will be able to:

  • Understand and explain cryptographic fundamentals and public-key infrastructure.
  • Assess web and email security protocols and apply necessary protections.
  • Implement data protection measures, including encryption techniques.
  • Perform vulnerability assessments using appropriate tools and methods.
  • Utilize various authentication mechanisms to secure systems.
  • Understand access control mechanisms and firewall architectures.
  • Configure and manage VPNs and remote access technologies for secure communications.
  • Implement wireless security protocols to protect against network vulnerabilities.

Support for Student Learning:

Students will have access to:

Learning Resources

Comprehensive materials including online articles, e-books, and tutorials.

Discussion Forums

Platforms for peer interaction and knowledge sharing.

Instructor Support

Guidance and feedback from experienced instructors.

Total Qualification Time:

The course content is flexible, designed to cater to a range of learning paces and styles.

Conclusion

The NCC Short Course in Cyber Security equips learners with essential skills and knowledge to safeguard digital systems and networks against evolving threats. By covering key areas such as cryptography, authentication, vulnerability assessment, and wireless security, the course prepares participants for real-world challenges in the cyber security field. Graduates will be well-prepared to apply their skills in securing information systems and pursuing further opportunities in this rapidly growing industry.

Leave A Comment

Your email address will not be published. Required fields are marked *