Date: | 15.09. - 01.12.2025 |
Aim of the course: | The course covers three domains of cybersecurity. The first domain, Endpoint Security, introduces critical foundational concepts in cybersecurity, such as common attacks and attackers; threats, vulnerabilities, and risks; current trends in cybersecurity; network protocol and service vulnerabilities, Windows and Linux endpoints; and threat mitigation and defense. The second domain, Network Defense, introduces critical foundational concepts in cybersecurity, such as system and network defense, access control, firewalls, cloud security, applications of cryptography, network security data, and evaluating security alerts. The third domain, Cyber Threat Management, introduces critical foundational concepts in cybersecurity, such as ethics and governance, network security testing, threat intelligence, endpoint vulnerability assessment, risk management, and post-incident response. |
Target group: | Cybersecurity Essentials is designed for learners who want to start their cybersecurity career journey. This course prepares students to take their first stepping stone toward entry-level or continuing their education toward associate and professional level job roles. This course teaches comprehensive cybersecurity concepts and skills at the entry level, from threat mitigation and defense to post-incident forensics. Learners will progress from basic cybersecurity concepts to experiences in assessing vulnerabilities and risks later in the curriculum. After successfully completing this course, you will receive a free digital badge along with course completion certificate. This course prepares you for the Cisco Certified Support Technician (CCST) Cybersecurity (100-160) exam. |
Prerequisites: | Learners are expected to have the following skills: *Basic computer literacy *Basic PC operating system navigation skills *Basic internet usage skills *Foundational understanding of networking and network device configuration. |
Topics: | 1 Cybersecurity Threats, Vulnerabilities, and Attacks 2 Securing Networks 3 Attacking the Foundation 4 Attacking What We Do 5 Wireless Network Communication Devices 6 Network Security Infrastructure 7 The Windows Operating System 8 Linux Overview 9 System and Endpoint Protection 10 Cybersecurity Principles, Practices, and Processes 11 Understanding Defense 12 System and Network Defense 13 Access Control 14 Access Control Lists 15 Firewall Technologies 16 Zone-Based Policy Firewalls 17 Cloud Security 18 Cryptography 19 Technologies and Protocols 20 Network Security Data 21 Evaluating Alerts 22 Governance and Compliance 23 Network Security Testing 24 Threat Intelligence 25 Endpoint Vulnerability Assessment 26 Risk Management and Security Controls 27 Digital Forensics and Incident Analysis and Response |
Study results: | Students who complete this course will be able to: *Explain network security principles *Explain how TCP/IP vulnerabilities enable network attacks *Use Windows administrative tools *Implement basic Linux security *Implement access control lists (ACLs) to filter traffic and mitigate network attacks *Implement Zone-Based Policy Firewall using the CLI *Use tools for network security testing *Use incident response models and forensic techniques to investigate security incidents |
Assessment criteria: | 51% from Final Test |
Comments: | Kursus toimub inglise keeles |
Learning outcomes: | Information and Communication Technologies (ICTs) |
Course language: | in Estonian |
Volume: | lectures: 48 academic hours independent studies: 30 academic hours |
Credit points (ECTS): | 3.0 |
Graduation document: | TalTech certificate |
Lecturer: | Mohammad Tariq Meeran, PhD |
Contact: | Marika Tamm, marika.tamm@taltech.ee |
Price: | 2000 EUR + VAT / participant |
Registration deadline: | 11.09.2025 |
Place: | webinars @Mondays 17:00-20:00 CISCO Webex Meetings keskkonnas |