Cybersecurity Essentials (CCST)

Registreeru

Toimumisaeg:09.03. - 25.05.2026
Eesmärk:The course covers three domains of cybersecurity.
*The first domain, Endpoint Security, introduces critical foundational concepts in cybersecurity, such as common attacks and attackers; threats, vulnerabilities, and risks; current trends in cybersecurity; network protocol and service vulnerabilities, Windows and Linux endpoints; and threat mitigation and defense.
*The second domain, Network Defense, introduces critical foundational concepts in cybersecurity, such as system and network defense, access control, firewalls, cloud security, applications of cryptography, network security data, and evaluating security alerts.
*The third domain, Cyber Threat Management, introduces critical foundational concepts in cybersecurity, such as ethics and governance, network security testing, threat intelligence, endpoint vulnerability assessment, risk management, and post-incident response.
Sihtgrupp:Cybersecurity Essentials is designed for learners who want to start their cybersecurity career journey. This course prepares students to take their first stepping stone toward entry-level or continuing their education toward associate and professional level job roles.
Eeldused:Learners are expected to have the following skills:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Foundational understanding of networking and network device configuration.
Teemad:1 Cybersecurity Threats, Vulnerabilities, and Attacks
2 Securing Networks
3 Attacking the Foundation
4 Attacking What We Do
5 Wireless Network Communication Devices
6 Network Security Infrastructure
7 The Windows Operating System
8 Linux Overview
9 System and Endpoint Protection
10 Cybersecurity Principles, Practices, and Processes
11 Understanding Defense
12 System and Network Defense
13 Access Control
14 Access Control Lists
15 Firewall Technologies
16 Zone-Based Policy Firewalls
17 Cloud Security
18 Cryptography
19 Technologies and Protocols
20 Network Security Data
21 Evaluating Alerts
22 Governance and Compliance
23 Network Security Testing
24 Threat Intelligence
25 Endpoint Vulnerability Assessment
26 Risk Management and Security Controls
27 Digital Forensics and Incident Analysis and Response
Õpiväljund:Troubleshoot a wireless network.
Use cybersecurity best practices to improve confidentiality, integrity, and availability.
Configure local and server-based access control.
Implement access control lists (ACLs) to filter traffic and mitigate network attacks.
Determine the cryptographic techniques that are required to ensure confidentiality, integrity, and authenticity.
Use tools for network security testing.
Evaluate threat intelligence sources.
Use incident response models and forensic techniques to investigate security incidents.
Hindamiskriteeriumid:51% from Final Test
Kommentaar:Koolitus toimub CISCO Webex Meetings keskkonnas. Vahetult enne kursuse algust jagatakse infot, kuidas keskkonda pääseda ja õige kursus leida.
Õppevaldkond:Informatsiooni- ja kommunikatsioonitehnoloogiad
Õppekeel:eesti keel, inglise keel
Maht:auditoorne õppetöö: 48 akadeemilist tundi
iseseisev/muu õppetöö: 30 akadeemilist tundi
Koolituse läbimist tõendav dokument:TalTech tunnistus
Lektor:Mohammad Tariq Meeran
Kontakt:Marika Tamm, marika.tamm@taltech.ee
Müügihind:2000 EUR + KM / osaleja
Registreerumise tähtaeg:05.03.2026
Koht:webinars@Mondays 17:00-20:00 CISCO Webex Meetings keskkonnas

Registreeru