0% found this document useful (0 votes)
0 views

Cyber-Security-Short-Course-Specification

The Cyber Security Short Course by NCC Education aims to equip learners with essential theoretical and practical skills for securing networks and data transmission. It covers topics such as cryptographic algorithms, public-key infrastructure, web and email security, vulnerability assessments, and firewall configurations. The course includes 40 guided learning hours and requires specific hardware and software for effective learning.

Uploaded by

Harsha de Silva
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Cyber-Security-Short-Course-Specification

The Cyber Security Short Course by NCC Education aims to equip learners with essential theoretical and practical skills for securing networks and data transmission. It covers topics such as cryptographic algorithms, public-key infrastructure, web and email security, vulnerability assessments, and firewall configurations. The course includes 40 guided learning hours and requires specific hardware and software for effective learning.

Uploaded by

Harsha de Silva
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CYBER

SECURITY
SHORT
COURSE
Short Course
Specification
Modification History

Version Revision Description


V1.0 For release
V1.1 Removed the assessment methodology

© NCC Education Limited, 2021

All Rights Reserved

The copyright in this document is vested in NCC Education Limited. The document must not be
reproduced by any means, in whole or in part, or used for manufacturing purposes, except with the
prior written permission of NCC Education Limited and then only on condition that this notice is
included in any such reproduction.

Published by: NCC Education Limited, The Towers, Towers Business Park, Wilmslow Road,
Didsbury, Manchester M20 2EZ UK

Tel: +44 (0) 161 438 6200 Fax: +44 (0) 161 438 6240 Email: [email protected]
http://www.nccedu.com
About NCC Education
NCC Education is a UK-based awarding body, active in the UK and internationally. Originally part of
the National Computing Centre, NCC Education started offering Computing qualifications in 1976
and from 1997 developed its Higher Education portfolio to include Business qualifications, IT
qualifications for school children and a range of Foundation qualifications.

With Centres in over forty countries, four international offices and academic managers worldwide,
NCC Education strives to employ the latest technologies for learning, assessment and support. NCC
Education is regulated and quality assured by Ofqual (the Office of Qualifications and Examinations
Regulation, see www.ofqual.gov.uk).

Overview and Objectives

Our Cyber Security Short Course will provide learners with the underlying theory and practical
skills required to secure networks and to send data safely and securely over network
communications (including securing the most common Internet services).

This course provides a look at the technologies employed to secure a network. It is designed to
provide learners with knowledge of the fundamental principles and techniques employed in securing
information and networks. The course will allow learners to assess the security risks inherent in
computer networks and the technologies that can be employed to counter such risks. It covers
cryptographic algorithms from a mathematical point of view, including practical examples of breaking
codes.

Once the learners have knowledge of the different types of algorithm, cryptographic protocols are
introduced for accomplishing a varied set of tasks, including authentication, secure message
exchange, digital signatures, etc. Other aspects of network security are then dealt with, such as
access control devices and firewalls, VPN, NAT, malware, vulnerability assessment, Intrusion
Detection Systems (IDS), etc.

Hardware and Software Requirements

Hardware: Learners need access to a number of networked computers with peripheral


devices, such as printers and scanners, plus Internet access, routers, and
firewalls. Wireless devices are also required that that can be added to this
network or used to create a standalone wireless network.

Software: Learners must have network/server software available to them plus relevant
security software. Learners will also need access to image manipulation
software such as Abode Photoshop, VPN server and client software, and a
remote desktop application (e.g. www.logmein.com). Suitable open source
software may also be used.

Page 2 of 4
Cyber Security Short Course Specification -2021
Cyber Security Short Course
Title: Cyber Security Short Course

Guided Learning Hours 40 hours

Learning Outcomes; Objectives;


The Learner will: The Learner can:
1. Understand the most 1.1 Explain the most common types of cryptographic algorithm
common types of (i.e. block ciphers, public-key ciphers and hash algorithms)
cryptographic 1.2 Select and justify an appropriate algorithm for a particular
algorithm purpose
2. Understand the 2.1 Describe the Public-key Infrastructure
Public-key 2.2 Explain the role of Certification Authorities
Infrastructure
3. Understand security 3.1 Explain the concept of Web security with TLS
protocols for 3.2 Describe Email security mechanisms
protecting data on
3.3 Describe disk encryption mechanisms
networks
3.4 Deploy file encryption mechanisms
4. Be able to digitally 4.1 Explain digital signatures
sign emails and files 4.2 Demonstrate applying for and deploying a Digital Certificate
4.3 Digitally sign an email
5. Understand 5.1 Explain the need for vulnerability assessments
Vulnerability 5.2 Interpret a vulnerability assessment report
Assessments and
5.3 Explain the different authentication mechanisms
the weakness of
using passwords for 5.4 Describe multifactor authentication
authentication 5.5 Describe biometrics and their issues
6. Be able to perform 6.1 Use port scanners to highlight open ports
simple vulnerability 6.2 Perform password cracking using dictionary and brute-force
assessments and methods
password audits
7. Be able to configure 7.1 Configure access control mechanisms
simple firewall 7.2 Describe the components of a firewall
architectures
7.3 Configure a DMZ firewall
7.4 Evaluate the limitations of firewalls
7.5 Apply and manage port forwarding rules
8. Understand Virtual 8.1 Explain Virtual Private Networks
Private Networks 8.2 Select an appropriate remote access solution
9. Be able to deploy 9.1 Explain the vulnerabilities inherent in wireless networks
wireless security 9.2 Deploy a secure network architecture for wireless access
9.3 Configure Access Control Lists
9.4 Encrypt and protect the wireless link

Page 3 of 4
Cyber Security Short Course Specification -2021
Syllabus
Syllabus content
Topic Course coverage Learning
Outcomes
covered
Cryptography • Cryptographic algorithms including: 1
Fundamentals - AES block cipher
- RSA public-key code
- SHA hash algorithm
PKI • The Public-Key Infrastructure 2&4
• Certification Authorities and Digital Signatures
Web Security • Browser security and SSL/TLS for encrypted browsing 3&4
Email Security • PGP and S/MIME for encrypted and authenticated email 3&4
Data Protection • File, disk and portable encryption technologies 3
Vulnerability • Vulnerability assessment terms and tools: 5&6
Assessment - Port scanners
- Password crackers
Authentication • Passwords 5
• Multi-factor authentication
• Biometrics
Access Control • Packet filtering 7
• Access control lists
• NAT
• IDS
Firewalls • Firewall architectures and their limitations 7
• The DMZ firewall and its limitations
VPN • Virtual Private Network technologies and issues 7&8
Remote Access • Alternative remote access technologies: 7&8
- Remote desktops
- Web applications
Wireless Security • Wireless security (WEP, WPA, WPA2) 9
• Secure network architectures for wireless deployments

Related National Occupational Standards (NOS)


Sector Subject Area: 6.1 ICT Professionals
Related NOS: 6.2.A.1 - Contribute to IT/technology security management activities;
6.2.A.2 - Document IT/technology security management processes;
6.2.A.3 - Assist the management with IT/technology security systems;
6.2.P.1 - Manage the IT/technology security requirements;
6.2.P.2 - Carry out IT/technology security management activities

Page 4 of 4
Cyber Security Short Course Specification -2021

You might also like