Networking and Cybersecurity Essentials
Course Description:
Computer Networking and Cybersecurity are the heart of the digital transformation. Often unseen, networks enable us to stay connected as we move around freely using our laptop or smartphone. This interconnected world makes everyone more susceptible to cyber-attacks. A single breach can have huge consequences for a company’s ability to function, hurting the bottom line and causing disruption in the daily lives of millions of people.
Networking and Cybersecurity Essentials is a combination of Networking Essentials, Introduction to Cybersecurity and Cybersecurity Essentials courses offered in partnership with the Pinckney Cyber Training Institute. The course begins with the basic network concepts to help you set up a SOHO (small-office/home-office) network and put you on the path to managing a larger-scale business network. You will explore cyber trends, threats and the broader topic of cybersecurity in a way that will matter to YOU. This course will help you develop an understanding of cybercrime, security principles, technologies, and procedures to defend networks.
This course is offered in partnership with the Pinckney Cyber Training Institute.
Course Details:
Course Title (District): | Networking and Cybersecurity Essentials | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Course Title (NCES SCED) : | Network Technology | ||||||||||
Course Provider : | Michigan Virtual | ||||||||||
Content Provided By : | Pinckney Cyber Training Institute | ||||||||||
Online Instructor Provided By : | Pinckney Cyber Training Institute | ||||||||||
Standards Addressed : | Michigan Center for Career and Technical Education | ||||||||||
Alignment Document : | https://docs.google.com/document/d/1c1DPzmPU8tJqICsLjpEPuUHZpjlWLLapUxhXr4RoD4U/edit?usp=sharing | ||||||||||
Academic Terms : | Accelerated, Semester, Trimester | ||||||||||
NCES SCED Code : |
|
How To Enroll:
Enrollment Website : | https://slp.michiganvirtual.org/ |
---|---|
Email : | [email protected] |
Phone : | (888) 889-2840 |
Students and Parents: It is important to work closely with your local school counselor or registrar to follow the school's enrollment procedures. By clicking the "Start Registration Request" button below, you will be able to notify the school of your interest in registering for the online course. However, it is the responsibility of the district or school to review the registration request and approve or deny the request. Please make a note to follow up with your school after submitting a registration request.
Additional Course Information:
- Email: [email protected]
- Phone: (888) 889-2840
- Explain how end-user devices and local networks interact with the global Internet.
- Explain the requirements for network connectivity.
- Build a small network using an integrated network router.
- Explain the importance of IP addressing.
- Explain how the protocols of the TCP/IP suite enable network communication.
- Configure an integrated wireless router and wireless clients to connect securely to the Internet.
- Configure basic network security.
- Build a simple computer network using Cisco devices.
- Troubleshoot common network issues found in home and small business networks.
- Explain the need and importance of cybersecurity.
- Explain the characteristics and value of personal data, and data within an organization.Recognize the characteristics and operation of a cyber attack.
- Interpret the trends in the cyber threat landscape.
- Understand how to protect devices from threats.
- Master how to safeguard your privacy.
- Learn techniques to protect organizations from cyber attacks.
- Recognize the behavior-based approach to cybersecurity.
- Understand legal and ethical issues in cybersecurity.
- Explain the opportunities for pursuing an education and a career in cybersecurity.
- Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
- Describe the tactics, techniques and procedures used by cyber criminals.
- Describe how technologies, products, and procedures are used to protect confidentiality.
- Describe how technologies, products, and procedures are used to ensure integrity.
- Describe how technologies, products, and procedures provide high availability.
- Explain how cybersecurity professionals use technologies, processes, and procedures to defend all components of the network.
- Explain the purpose of laws related to cybersecurity.
- A computer with either Windows (7 or later), Linux, Macintosh Operating System, or Chromebook. Chromebook users will need to contact their instructor to request installation of a virtual machine.
- Reliable Internet Access;
- Ability to download and install Packet Tracer, a stand-alone program that is required for all Cisco NetAcademy Courses;
- Ability to download/upload PDF files as well as Packet Tracer files (.pka);
- A PDF reader to complete assignments (Recommend: Adobe Reader); Note: All Reading Guides/Labs are fillable PDF files.
- Up to date Chrome and/or Firefox Web Browser to access the curriculum;
- Java (JRE) to access Packet Tracer testing environment;
- Students also require access to YouTube.
Additional Cost Description:
None
Upon completion of this course, students will be able to...
NSQ National Standards for Quality Online Courses
Rating | Comments | |
---|---|---|
A1. A course overview and syllabus are included in the online course | Pilot: Review Pending | |
A2. Minimum computer skills and digital literacy skills expected of the learner are clearly stated.* | Pilot: Review Pending | |
A3. The instructor’s biographical information and information on how to communicate with the instructor are provided to learners and other stakeholders. | Pilot: Review Pending | |
A4. Learner expectations and policies are clearly stated and readily accessible within the introductory material of the course. | Pilot: Review Pending | |
A5. Minimum technology requirements for the course are clearly stated, and information on how to obtain the technologies is provided.* | Pilot: Review Pending | |
A6. Grading policies and practices are clearly defined in accordance with course content learning expectations. | Pilot: Review Pending | |
A7. The online course provides a clear description or link to the technical support offered and how to obtain it.* | Pilot: Review Pending | |
A8. Learners are offered an orientation prior to the start of the online course. | Pilot: Review Pending |
Rating | Comments | |
---|---|---|
B1. The online course objectives or competencies are measurable and clearly state what the learner will be able to demonstrate as a result of successfully completing the course.* | Pilot: Review Pending | |
B2. The online course expectations are consistent with course-level objectives or competencies, are representative of the structure of the course, and are clearly stated. | Pilot: Review Pending | |
B3. The online course content is aligned with accepted state and/or other accepted content standards, where applicable.* | Pilot: Review Pending | |
B4. Digital literacy and communication skills are incorporated and taught as an integral part of the curriculum.* | Pilot: Review Pending | |
B5. Supplemental learning resources and related instructional materials are available to support and enrich learning and are aligned to the specific content being delivered.* | Pilot: Review Pending | |
B6. The online course content and supporting materials reflect a culturally diverse perspective that is free of bias.* | Pilot: Review Pending | |
B7. The online course materials (e.g., textbooks, primary source documents, OER) that support course content standards are accurate and current. | Pilot: Review Pending | |
B8. The online course is free of adult content and avoids unnecessary advertisements.* | Pilot: Review Pending | |
B9. Copyright and licensing status for any third-party content is appropriately cited and easily found. | Pilot: Review Pending | |
B10. Documentation and other support materials are available to support effective online course facilitation.* | Pilot: Review Pending |
Rating | Comments | |
---|---|---|
C1. The online course design includes activities that guide learners toward promoting ownership of their learning and self-monitoring. | Pilot: Review Pending | |
C2. The online course’s content and learning activities promote the achievement of the stated learning objectives or competencies. | Pilot: Review Pending | |
C3. The online course is organized by units and lessons that fall into a logical sequence. | Pilot: Review Pending | |
C4. The online course content is appropriate to the reading level of the intended learners.* | Pilot: Review Pending | |
C5. The online course design includes introductory assignments or activities to engage learners within the first week of the course. | Pilot: Review Pending | |
C6. The online course provides learners with multiple learning paths as appropriate, based on learner needs, that engage learners in a variety of ways. | Pilot: Review Pending | |
C7. The online course provides regular opportunities for learner-learner interaction. | Pilot: Review Pending | |
C8. The online course design provides opportunities for learner-instructor interaction, including opportunities for regular feedback about learner progress.* | Pilot: Review Pending | |
C9. Online course instructional materials and resources present content in an effective, engaging, and appropriate manner.* | Pilot: Review Pending |
Rating | Comments | |
---|---|---|
D1. Learner assessments are linked to stated course, unit, or lesson-level objectives or competencies. | Pilot: Review Pending | |
D2. Valid course assessments measure learner progress toward mastery of content. | Pilot: Review Pending | |
D3. Assessment practices provide routine and varied opportunities for self-monitoring and reflection of learning.* | Pilot: Review Pending | |
D4. Assessment materials provide the learner with the flexibility to demonstrate mastery in a variety of ways.* | Pilot: Review Pending | |
D5. Rubrics that clearly define expectations for varied levels of proficiency are created and shared with learners.* | Pilot: Review Pending |
Rating | Comments | |
---|---|---|
E1. Online course navigation is logical, consistent, and efficient from the learner’s point of view.* | Pilot: Review Pending | |
E2. The online course design facilitates readability.* | Pilot: Review Pending | |
E3. The online course provides accessible course materials and activities to meet the needs of diverse learners.* | Pilot: Review Pending | |
E4. Course multimedia facilitate ease of use.* | Pilot: Review Pending | |
E5. Vendor accessibility statements are provided for all technologies required in the course.* | Pilot: Review Pending |
Rating | Comments | |
---|---|---|
F1. Educational tools ensure learner privacy and maintain confidentiality of learner information in accordance with local, state, and national laws for learner data. | Pilot: Review Pending | |
F2. The online course tools support the learning objectives or competencies.* | Pilot: Review Pending | |
F3. The online course provides options for the instructor to adapt learning activities to accommodate learners’ needs and preferences.* | Pilot: Review Pending | |
F4. The course allows instructors to control the release of content.* | Pilot: Review Pending | |
F5. The course provides the necessary technical functionality to score and record assessments and calculate earned course points or grades.* | Pilot: Review Pending |
Rating | Comments | |
---|---|---|
G1. The online course uses multiple methods and sources of input for assessing course effectiveness. | Pilot: Review Pending | |
G2. The online course is reviewed to ensure that the course is current. | Pilot: Review Pending | |
G3. The online course is updated on a continuous improvement cycle for effectiveness based on the findings from ongoing reviews. | Pilot: Review Pending |
Review Conducted By: Michigan Virtual
Date of Review:
01/04/2022
Segment 1: Networking Essentials
Communications in a Connected World
Online Communications
Explore Networks
Peer to Peer Networks
Providing Network Services
Communications Principles
Network Design
Routing
Internet Protocol
Dynamic Addressing (DHCP)
IP Addressing
Transport Services
Build a Home Network
Security Considerations
Cisco Switches and Routers
Segment 2: Introduction to Cybersecurity
The Need for Cybersecurity
Attacks, Concepts, Techniques
Protecting Your Data and Privacy
Protecting the Organization
Your Future in Cybersecurity
Segment 3: Cybersecurity Essentials
Cybersecurity Experts or Criminals
The Cybersecurity Cube
Threats, Vulnerabilities, Attacks
The Art of Protecting Secrets
The Art of Ensuring Integrity
The Five Nines Concept
Protecting a Cybersecurity Domain
Becoming a Cybersecurity Specialist
Term Type | Enrollment Opens | Enrollment Ends | Random Draw Date | Enrollment Drop Date | Course Starts | Course Ends | # of Seats | Course Fee | Potential Additional Costs |
---|
Drop Policy | Completion Policy | Term Type | Enrollment Opens | Enrollment Ends |
---|
Please review the Michigan Virtual Technology Requirements: https://michiganvirtual.org/about/support/knowledge-base/technical-requirements/