Networking and Cybersecurity Essentials
Computer Networking and Cybersecurity are the heart of the digital transformation. Often unseen, networks enable us to stay connected as we move around freely using our laptop or smartphone. This interconnected world makes everyone more susceptible to cyber-attacks. A single breach can have huge consequences for a company’s ability to function, hurting the bottom line and causing disruption in the daily lives of millions of people.
|Course Title (District):||Networking and Cybersecurity Essentials|
|Course Title (NCES SCED) :||Network Technology|
|Course Provider :||Michigan Virtual|
|Content Provided By :||Pinckney Cyber Training Institute|
|Online Instructor Provided By :||Pinckney Cyber Training Institute|
|Standards Addressed :||MCCTE|
|Ailgnment Document :||https://drive.google.com/open?id=1c1DPzmPU8tJqICsLjpEPuUHZpjlWLLapUxhXr4RoD4U|
|Academic Terms :||Accelerated, Semester, Trimester|
|NCES SCED Code :||
How To Enroll:
|Enrollment Website :||https://slp.michiganvirtual.org/|
|Email :||[email protected]|
|Phone :||(888) 889-2840|
Students and Parents: It is important to work closely with your local school counselor or registrar to follow the school's enrollment procedures. By clicking the "Start Registration Request" button below, you will be able to notify the school of your interest in registering for the online course. However, it is the responsibility of the district or school to review the registration request and approve or deny the request. Please make a note to follow up with your school after submitting a registration request.
Additional Course Information:
- Email: [email protected]
- Phone: (888) 889-2840
- Explain how end-user devices and local networks interact with the global Internet.
- Explain the requirements for network connectivity.
- Build a small network using an integrated network router.
- Explain the importance of IP addressing.
- Explain how the protocols of the TCP/IP suite enable network communication.
- Configure an integrated wireless router and wireless clients to connect securely to the Internet.
- Configure basic network security.
- Build a simple computer network using Cisco devices.
- Troubleshoot common network issues found in home and small business networks.
- Explain the need and importance of cybersecurity.
- Explain the characteristics and value of personal data, and data within an organization.Recognize the characteristics and operation of a cyber attack.
- Interpret the trends in the cyber threat landscape.
- Understand how to protect devices from threats.
- Master how to safeguard your privacy.
- Learn techniques to protect organizations from cyber attacks.
- Recognize the behavior-based approach to cybersecurity.
- Understand legal and ethical issues in cybersecurity.
- Explain the opportunities for pursuing an education and a career in cybersecurity.
- Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
- Describe the tactics, techniques and procedures used by cyber criminals.
- Describe how technologies, products, and procedures are used to protect confidentiality.
- Describe how technologies, products, and procedures are used to ensure integrity.
- Describe how technologies, products, and procedures provide high availability.
- Explain how cybersecurity professionals use technologies, processes, and procedures to defend all components of the network.
- Explain the purpose of laws related to cybersecurity.
- A computer with either Windows (7 or later), Linux, or Macintosh operating system
- Reliable Internet Access
- Ability to download and install Packet Tracer, a stand-alone program that is required for all Cisco NetAcademy Courses
- Ability to download/upload PDF files as well as Packet Tracer files (.pka)
- Up to date Chrome and/or Firefox Web Browser to access the curriculum
- Java (JRE) to access Packet Tracer testing environment
- A PDF reader to complete assignments (Recommend: Adobe Reader); Note: All Reading Guides/Labs are fillable PDF files
- Access to YouTube
Upon completion of this course, students will be able to…
INACOL Online Course Quality Standards
|Academic Content Standards and Assessments||Rating||Comments|
|The goals and objectives clearly state what the participants will know or be able to do at the end of the course. The goals and objectives are measurable in multiple ways.|
|The course content and assignments are aligned with the state’s content standards, Common Core curriculum, or other accepted content standards set for Advanced Placement® courses, technology, computer science, or other courses whose content is not included in the state standards.|
|The course content and assignments are of sufficient rigor, depth and breadth to teach the standards being addressed.|
|Information literacy and communication skills are incorporated and taught as an integral part of the curriculum.|
|Multiple learning resources and materials to increase student success are available to students before the course begins.|
|Course Overview and Introduction||Rating||Comments|
|Clear, complete course overview and syllabus are included in the course.|
|Course requirements are consistent with course goals, are representative of the scope of the course and are clearly stated.|
|Information is provided to students, parents and mentors on how to communicate with the online instructor and course provider.|
|Legal and Acceptable Use Policies||Rating||Comments|
|The course reflects multi-cultural education, and the content is accurate, current and free of bias or advertising.|
|Expectations for academic integrity, use of copyrighted materials, plagiarism and netiquette (Internet etiquette) regarding lesson activities, discussions, and e-mail communications are clearly stated.|
|Privacy policies are clearly stated.|
|Online instructor resources and notes are included.|
|Assessment and assignment answers and explanations are included.|
|Instructional and Audience Analysis||Rating||Comments|
|Course design reflects a clear understanding of all students’ needs and incorporates varied ways to learn and master the curriculum.|
|Course, Unit and Lesson Design||Rating||Comments|
|The course is organized by units and lessons that fall into a logical sequence. Each unit and lesson includes an overview describing objectives, activities, assignments, assessments, and resources to provide multiple learning opportunities for students to master the content.|
|Instructional Strategies and Activities||Rating||Comments|
|The course instruction includes activities that engage students in active learning.|
|The course and course instructor provide students with multiple learning paths, based on student needs that engage students in a variety of ways.|
|The course provides opportunities for students to engage in higher-order thinking, critical reasoning activities and thinking in increasingly complex ways.|
|The course provides options for the instructor to adapt learning activities to accommodate students’ needs.|
|Readability levels, written language assignments and mathematical requirements are appropriate for the course content and grade-level expectations.|
|Communication and Interaction||Rating||Comments|
|The course design provides opportunities for appropriate instructor-student interaction, including opportunities for timely and frequent feedback about student progress.|
|The course design includes explicit communication/activities (both before and during the first week of the course) that confirms whether students are engaged and are progressing through the course. The instructor will follow program guidelines to address non-responsive students.|
|The course provides opportunities for appropriate instructor-student and student-student interaction to foster mastery and application of the material.|
|Resources and Materials||Rating||Comments|
|Students have access to resources that enrich the course content.|
|Student evaluation strategies are consistent with course goals and objectives, are representative of the scope of the course and are clearly stated.|
|The course structure includes adequate and appropriate methods and procedures to assess students’ mastery of content.|
|Ongoing, varied, and frequent assessments are conducted throughout the course to inform instruction.|
|Assessment strategies and tools make the student continuously aware of his/her progress in class and mastery of the content.|
|Assessment Resources and Materials||Rating||Comments|
|Assessment materials provide the instructor with the flexibility to assess students in a variety of ways.|
|Grading rubrics are provided to the instructor and may be shared with students.|
|The grading policy and practices are easy to understand.||lrohde|
|The course architecture permits the online instructor to add content, activities and assessments to extend learning opportunities.|
|The course accommodates multiple school calendars; e.g., block, 4X4 and traditional schedules.|
|Clear and consistent navigation is present throughout the course.|
|Rich media are provided in multiple formats for ease of use and access in order to address diverse student needs.|
|Technology Requirements and Interoperability||Rating||Comments|
|All technology requirements (including hardware, browser, software, etc...) are specified.|
|Prerequisite skills in the use of technology are identified.|
|The course uses content-specific tools and software appropriately.|
|The course is designed to meet internationally recognized interoperability standards.|
|Copyright and licensing status, including permission to share where applicable, is clearly stated and easily found.|
|Course materials and activities are designed to provide appropriate access to all students. The course, developed with universal design principles in mind, conforms to the U.S. Section 504 and Section 508 provisions for electronic and information technology as well as the W3C’s Web Content Accessibility guidelines (WCAg 2.0).|
|Student information remains confidential, as required by the Family Educational Rights and Privacy Act (FERPA).|
|Accessing Course Effectiveness||Rating||Comments|
|The course provider uses multiple ways of assessing course effectiveness.|
|The course is evaluated using a continuous improvement cycle for effectiveness and the findings used as a basis for improvement.|
|The course is updated periodically to ensure that the content is current.|
|Course instructors, whether faceto-face or virtual, are certificated and “highly qualified.” The online course teacher possesses a teaching credential from a state-licensing agency and is “highly qualified” as defined under ESEA.|
|Instructor and Student Support||Rating||Comments|
|Professional development about the online course delivery system is offered by the provider to assure effective use of the courseware and various instructional media available.|
|The course provider offers technical support and course management assistance to students, the course instructor, and the school coordinator.|
|Course instructors, whether face-to-face or virtual, have been provided professional development in the behavioral, social, and when necessary, emotional, aspects of the learning environment.|
|Course instructors, whether face-to-face or virtual, receive instructor professional development, which includes the support and use of a variety of communication modes to stimulate student engagement online.|
|The provider assures that course instructors, whether face-to-face or virtual, are provided support, as needed, to ensure their effectiveness and success in meeting the needs of online students.|
|Students are offered an orientation for taking an online course before starting the coursework.|
Review Conducted By : Quality Matters
Date of Review : 04/05/2019
Segment 1: Networking Essentials
Ever Wonder How it Works?
Networks in Our Daily Lives
Communicating on a Local Network
Providing Network Services
Building a Home Network
Configuring Cisco Devices
Testing and Troubleshooting
Segment 2: Introduction to Cybersecurity
The Need for Cybersecurity
Attacks, Concepts, Techniques
Protecting Your Data and Privacy
Protecting the Organization
Your Future in Cybersecurity
Segment 3: Cybersecurity Essentials
Cybersecurity Experts or Criminals
The Cybersecurity Cube
Threats, Vulnerabilities, Attacks
The Art of Protecting Secrets
The Art of Ensuring Integrity
The Five Nines Concept
Protecting a Cybersecurity Domain
Becoming a Cybersecurity Specialist
|Term Type||Enrollment Opens||Enrollment Ends||Random Draw Date||Enrollment Drop Date||Course Starts||Course Ends||# of Seats||Course Fee||Potential Additional Costs|
|Drop Policy||Completion Policy||Term Type||Enrollment Opens||Enrollment Ends|
|The drop date for a full refund by the refund date or 25 consecutive days after the enrollment's start date, which ever date comes soonest.||Students may access their course from their enrollment start date to their enrollment end date. A completion is a 60% final score or higher.||Trimester||04/01/2020||10/19/2020|
|The drop date for a full refund by the refund date or 25 consecutive days after the enrollment's start date, which ever date comes soonest.||Students may access their course from their enrollment start date to their enrollment end date. A completion is a 60% final score or higher.||Semester||04/01/2020||11/02/2020|
|The drop date for a full refund by the refund date or 25 consecutive days after the enrollment's start date, which ever date comes soonest.||Students may access their course from their enrollment start date to their enrollment end date. A completion is a 60% final score or higher.||Trimester||04/01/2020||01/04/2021|
Students can use email or the private message system within the Student Learning Portal to access highly qualified teachers when they need instructor assistance. Students will also receive feedback on their work inside the learning management system. The Instructor Info area of their course may describe additional communication options.
Please review the Michigan Virtual Technology Requirements: https://michiganvirtual.org/about/support/knowledge-base/technical-requirements/