You are on page 1of 5

Professional Diploma in

Cyber Security
Starter Pack
Edwin has recently joined the Shaw Academy team as our cyber
security subject matter expert.

Edwin graduated with a BSc in Computer Science from Dorset


College in Dublin, after which he advanced his knowledge in cyber
and digital security at IBAT College, Dublin.

Edwin is very enthusiastic about what he does - it has kept him


motivated throughout his career. Having worked in the area of
physical security and system administration in one of the best
tech companies in the world, his speciality includes policy and
architectural design, data loss prevention implementation, identity
and access management, incident response, forensic analysis, and
Cyber Security penetration testing.

Starter Pack

Meet your educator


Edwin Odeh
Module 1

Lesson 1: Exploring the fundamentals of networking


Lesson 2: Setting up a small network
Lesson 3: Concept of a Wi-Fi or wireless network
Lesson 4: Types of wireless access point
Lesson 5: Logical Addressing
Lesson 6: Benefits of a Wi-Fi wireless network
Lesson 7: Design and deployment of enterprise wireless
Lesson 8: Implementing security on a wireless and wired
network
Cyber Security
Module 2
Course outline Lesson 1: Identifying the need for security
Lesson 2: Securing devices
Lesson 3: Risk of network attacks
In this course you can expect 4 modules
Lesson 4: Identify and mitigate network attacks
comprising the following:
Lesson 5: Securing and managing wireless devices

Each module consists of: Lesson 6: Securing web, email, social networking
• 8 lessons Lesson 7: Applying physical security on devices
• 8 post-lesson quizzes Lesson 8: Protecting your data
• 4 practice assignments
• 1 module assignment Module 3

Lesson 1: Introduction into network security


As an extra, you are able to purchase the
Lesson 2: Firewalls and VPN
toolkit:
Lesson 3: Anti-virus and anti-malware software
• Webinar slides
Lesson 4: Network segmentation / intrusion prevention
• Summary notes
• Bonus lessons systems
Lesson 5: Access control
Lesson 6: Application security
Lesson 7: Behavioural analytics
Lesson 8: Data loss prevention / event management

Module 4

Lesson 1: History of the NIST framework


Lesson 2: Understanding the structure of the framework
component
Lesson 3: Exploring the NIST cybersecurity framework
and its component
Lesson 4: Aims of the framework
Lesson 5: Implementation and benefits
Lesson 6: Functions of the framework
Lesson 7: Implementation of risk management on an
asset using the NIST framework
Lesson 8: Decision-making and implementing the
Framework

Cyber Security Your cybersecurity course includes detailed content and


practical understanding of networking, ethical hacking,
common malware, and how to mitigate risk in an online context
with the NIST cybersecurity framework. We will be exploring
the fundamentals of networking, how data is created in view of
the OSI -TCP/IP stack, identifying different devices in a network,
exploring a network topology, and how different networks
create the internet!

Tips before you get started


Think before you click
There are 152 million blogs on the internet. You need to be able
All actions and reactions are equal. You might just be a click
away from loading a malicious web page. Not all mistakes can
be undone with “ctrl + z”.

Two-factor authentication
Utilise the extra layer of security with two-factor authentication,
Legacy passwords are vital, but two-factor authentication gives
you an additional layer of security on your device.

Be vigilant with phishing scams


Phishing scams have been on the rise, and attackers have
become very clever with these attacks. Common phishing tactics
include communication around ”Security notice - fix security
info now”, “Account irregular activity detected”, “COVID-19
contact tracing program”, and “Courier delay”. These are used
to trick users into opening malicious links. Check grammatical
errors and look at any inconsistencies in the email. Also, verify
the mail is coming from an authentic source.
Track your digital footprint
A common way is to monitor places where your account was
last opened (location, device, etc.). If any suspicious activity is
seen, change your password immediately and apply two-factor
authentication where possible.

Keep up to date
Companies are always updating their software with “patches” -
when bugs are discovered in the form of vulnerability, flaws in a
software, etc., they are patched to keep the software safe. Users
can protect their devices with these latest software patches,

Cyber Security so make sure you perform those annoying but crucial device
updates!

Back-up your data


This is super important to always have a mirror back-up of
your data. In the case of an attack or loss of a device with your
back-up saved, users can simply migrate to another device and
import that mirror back-up saved to the new device.

You might also like