Course Description

This course covers the interdisciplinary field of cybersecurity by discussing the evolution of information security into cybersecurity, cybersecurity theory, and the relationship of cybersecurity to nations, businesses, society, and people. Participants will review multiple cybersecurity technologies, processes, and procedures, learn how to analyze the threats, vulnerabilities and risks present in these environments, and develop appropriate strategies to diminish potential cybersecurity problems.


This course is for anyone with none to three years of cybersecurity experience. Also, professionals with responsibility in the areas of audit, risk, compliance, information security, government and legal functions with a familiarity of basic IT/IS concepts who are new to cybersecurity or are interested in entering the field of cybersecurity.


Students taking this course should have a basic understanding of computers and the essentials of their operating systems.

Topics and Course Content

  • Foundation of Security

    • Essential Terminologies
    • Potential Losses Due to Security Attacks
  • Securing Operating Systems

    • Threats to System Security
    • Guidelines for Windows OS Security
  • Protecting System Using Antiviruses

    • How Does Antivirus Software Work?
    • Steps to Install Antivirus on Your Computer
  • Data Back UP

    • Online Backup Service Providers
    • Back Up the Data Using Windows Backup
  • Internet Security Settings

    • Understanding Cookies
    • Risks Involved Online
  • Securing Online Transactions

    • Online Shopping
    • Trustworthy and Untrustworthy Websites
  • Securing Email Communications

    • Email Security Treats
    • Email Security Procedures
  • Social Engineering and Identity Theft

    • Protecting from Identity Theft
    • What to Do if Identity is Stolen?
  • Security on Social Networking Sites

    • Security Risks Involved in Social Networking Sites
    • Facebook Privacy Settings
  • Securing Mobile Devices

    • Mobile Device Security Risks
    • Threats to Bluetooth Devices

Learning Goals and Results

At the conclusion of the course, the participants will be able to:

  • Explain Information Assurance (IA) principles
  • Identify the key parts of a cybersecurity network
  • Describe risk management processes and practices as it applies to cybersecurity
  • Identify security tools
  • Distinguish system among the types security threats and vulnerabilities
  • Describe different categories of attacks
  • Define types of incidents including responses and timelines for response
  • Analyze threats and risks within context of the cybersecurity
  • Review cybersecurity incidents to apply appropriate response
  • Evaluate decision making outcomes of cybersecurity scenarios

Time Investment

This class is 35 hours of classroom time taken in 3 1/2 – hour sessions over the course of 10 weeks.

Please Note: Course content and time investment can also be customized to an individual company’s needs.

Employee Application Employer Application