Cyber-Security-Short-Course-Specification
Cyber-Security-Short-Course-Specification
SECURITY
SHORT
COURSE
Short Course
Specification
Modification History
The copyright in this document is vested in NCC Education Limited. The document must not be
reproduced by any means, in whole or in part, or used for manufacturing purposes, except with the
prior written permission of NCC Education Limited and then only on condition that this notice is
included in any such reproduction.
Published by: NCC Education Limited, The Towers, Towers Business Park, Wilmslow Road,
Didsbury, Manchester M20 2EZ UK
Tel: +44 (0) 161 438 6200 Fax: +44 (0) 161 438 6240 Email: [email protected]
http://www.nccedu.com
About NCC Education
NCC Education is a UK-based awarding body, active in the UK and internationally. Originally part of
the National Computing Centre, NCC Education started offering Computing qualifications in 1976
and from 1997 developed its Higher Education portfolio to include Business qualifications, IT
qualifications for school children and a range of Foundation qualifications.
With Centres in over forty countries, four international offices and academic managers worldwide,
NCC Education strives to employ the latest technologies for learning, assessment and support. NCC
Education is regulated and quality assured by Ofqual (the Office of Qualifications and Examinations
Regulation, see www.ofqual.gov.uk).
Our Cyber Security Short Course will provide learners with the underlying theory and practical
skills required to secure networks and to send data safely and securely over network
communications (including securing the most common Internet services).
This course provides a look at the technologies employed to secure a network. It is designed to
provide learners with knowledge of the fundamental principles and techniques employed in securing
information and networks. The course will allow learners to assess the security risks inherent in
computer networks and the technologies that can be employed to counter such risks. It covers
cryptographic algorithms from a mathematical point of view, including practical examples of breaking
codes.
Once the learners have knowledge of the different types of algorithm, cryptographic protocols are
introduced for accomplishing a varied set of tasks, including authentication, secure message
exchange, digital signatures, etc. Other aspects of network security are then dealt with, such as
access control devices and firewalls, VPN, NAT, malware, vulnerability assessment, Intrusion
Detection Systems (IDS), etc.
Software: Learners must have network/server software available to them plus relevant
security software. Learners will also need access to image manipulation
software such as Abode Photoshop, VPN server and client software, and a
remote desktop application (e.g. www.logmein.com). Suitable open source
software may also be used.
Page 2 of 4
Cyber Security Short Course Specification -2021
Cyber Security Short Course
Title: Cyber Security Short Course
Page 3 of 4
Cyber Security Short Course Specification -2021
Syllabus
Syllabus content
Topic Course coverage Learning
Outcomes
covered
Cryptography • Cryptographic algorithms including: 1
Fundamentals - AES block cipher
- RSA public-key code
- SHA hash algorithm
PKI • The Public-Key Infrastructure 2&4
• Certification Authorities and Digital Signatures
Web Security • Browser security and SSL/TLS for encrypted browsing 3&4
Email Security • PGP and S/MIME for encrypted and authenticated email 3&4
Data Protection • File, disk and portable encryption technologies 3
Vulnerability • Vulnerability assessment terms and tools: 5&6
Assessment - Port scanners
- Password crackers
Authentication • Passwords 5
• Multi-factor authentication
• Biometrics
Access Control • Packet filtering 7
• Access control lists
• NAT
• IDS
Firewalls • Firewall architectures and their limitations 7
• The DMZ firewall and its limitations
VPN • Virtual Private Network technologies and issues 7&8
Remote Access • Alternative remote access technologies: 7&8
- Remote desktops
- Web applications
Wireless Security • Wireless security (WEP, WPA, WPA2) 9
• Secure network architectures for wireless deployments
Page 4 of 4
Cyber Security Short Course Specification -2021