Certificate in Cyber Security



Similar documents
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Module 1: e- Learning

Bachelor of Information Technology (Network Security)

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Introduction to Cyber Security / Information Security

The Information Security Problem

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

NETWORK ADMINISTRATION AND SECURITY

EECS 588: Computer and Network Security. Introduction January 14, 2014

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Information, Network & Cyber Security

Cryptography & Network Security

CPSC 467: Cryptography and Computer Security

EECS 588: Computer and Network Security. Introduction

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

e-code Academy Information Security Diploma Training Discerption

Ursuline College Accelerated Program URSULINE COLLEGE

Information Security Course Specifications

Information Security

Unit 3 Cyber security

VALLIAMMAI ENGINEERING COLLEGE

MS Information Security (MSIS)

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

InfoSec Academy Application & Secure Code Track

Cyber Security Governance in Open Distance Learning

CRYPTOG NETWORK SECURITY

EC-Council. Certified Ethical Hacker. Program Brochure

Table of Contents. Bibliografische Informationen digitalisiert durch

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

An expert s tips for cracking tough CISSP exam

Security + Certification (ITSY 1076) Syllabus

Certified Cyber Security Analyst VS-1160

Computer Security (EDA263 / DIT 641)

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Eleventh Hour Security+

CRYPTOGRAPHY AND NETWORK SECURITY

Information and Communications Technology Courses at a Glance

Network Security Course Specifications

Bellevue University Cybersecurity Programs & Courses

Master of Science in Cyber Security and Management

Master s Program in Information Systems

CESG Certification of Cyber Security Training Courses

CURRICULUM STRUCTURE FOR. IAOP Certified Outsourcing Specialist (COS) Human Resources

Chapter 8. Network Security

Weighted Total Mark. Weighted Exam Mark

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Short courses presented by the NWU Programme in Forensic Accountancy

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Curriculum Form. 1. Name of the curriculum Küberturbe tehnoloogiad 2. Name of the curriculum in Cyber Security Engineering

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Content Teaching Academy at James Madison University

CISA TIMETABLE (4 DAYS)

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

ATTPS Publication: Trustworthy ICT Taxonomy

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Networked Systems Security

EXAM questions for the course TTM Information Security May Part 1

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

IT and Cyber Security Training Courses

External Supplier Control Requirements

Unit title: Cyber Security Fundamentals (SCQF level 4)

CSE/EE 461 Lecture 23

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

FORBIDDEN - Ethical Hacking Workshop Duration

FREQUENTLY ASKED QUESTIONS 2016 B. TECH: NURSING: PRIMARY HEALTH CARE

CompTIA Security+ (Exam SY0-410)

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

IT Networks & Security CERT Luncheon Series: Cryptography

EC Council Certified Ethical Hacker V8

Cryptography and Network Security

Information Security and Cryptography

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Gold Lock Desktop White Paper

Computer and Network Security

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Loophole+ with Ethical Hacking and Penetration Testing

COURSE INFORMATION. To register online: visit

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Wireless Mobile Internet Security. 2nd Edition

COURSE PROFILE. This course aims to give IT people the awareness for security needs of information in organizations, tools to enhance security.

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Department of Information Systems and Cyber Security

A Systems Engineering Approach to Developing Cyber Security Professionals

Transcription:

Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff Industries. Course title Certificate in Cyber Security Purpose of the course To respond to the training needs of security teams within industry and to build capacity in cyber and satellite security. South Africa is experiencing immense shortages of cyber security specialists and especially shortages in focused training opportunities for corporate staff. Cooperation between industry and universities to establish and offer targeted training content within the cyber security domain is not yet realized within South Africa. This is also evident within the nano-satellite industry as applications are developed to utilize constellations. F SATI is moving towards the design and development of targeted software applications and it becomes essential to study and integrate effective security tools and techniques from the start. This training is unique as it is developed by specialists within industry and is to be offered through cooperation between industry and academia. In this way research can be stimulated and a culture of cyber and satellite security can be promoted to benefit industry and the local community. The main objective of the course is to provide training to security teams within the corporate environments and at the same time provide private persons with the opportunity to enter the computer security market. Target Market Security personnel working within the spheres of information and computer security as well as prospective students that want to embark on a career within the cyber and satellite security domain. Entrance qualification Matric certificate or equivalent qualification with a minimum of 50% for Mathematics. Experience within the information security industry will be beneficial. Attendees must have Internet access and suitable computing hardware and software in order to participate on the e-learning forums and complete practical assignments. Structure of the course The course consists of four modules. Each of the modules is presented by way of two days contact (face-to-face) sessions followed by a 2 week e-learning period. A student has to pass all four modules with a minimum mark of 70% in order to successfully complete the course and receive the certificate in cyber security. The e-learning period following the module presentations provides a way for the attendees to participate and communicate with experts via dedicated online forums and in doing so form part of a growing cyber security community. Page 1 of 5

Duration Each module consists of two days contact time as well as a two week e-learning period. The total duration for all four modules: 8 days contact time and 8 weeks e-learning. Dates & Times Venue for contact sessions: F SATI, Bellville campus. Dates for 2014 (9h00-16h00): Module 1 (Computer Systems and Security Environment) Contact session dates: 30 September & 1 October 2014 E-learning period: 2 October 2014-13 October 2014 Module 2 (Analysis, Writing & Cryptography) Contact session dates: 14 & 15 October 2014 E-learning period: 16 October 2014 3 November 2014 Module 3: (Technical Security) Contact session dates: 4 & 5 November 2014 E-learning period: 6 November 2014 17 November 2014 Module 4: (Security Governance) Contact session dates: 18 & 19 November 2014 E-learning period: 20 November 11 December 2014 Exam: 12 December 2014 Course fee per person ZAR 4,850 per module (of 4 modules). Total for all modules ZAR 19,400. Core Syllabus MODULE 1: COMPUTER SYSTEMS AND THE SECURITY ENVIRONMENT Introduction to Information Security What is security? The need for security The enemy (black hat, white hat, hacktivism, organized crime) Security terminologies CIA (Pillars of information security) & authentication & non-repudiation Satellite security Threat environment Security awareness Information warfare Social engineering Malicious code (i.e. botnets, malware, etc.) Introduction to the attack process Introduction to attack vectors Page 2 of 5

Page 3 of 5 Social networks (i.e. attacks via facebook, twitter, etc.) Computer Systems Essentials Introduction to operating systems Networking & communication essentials Internet & Web essentials File management & database systems Application software Software design & testing MODULE 2: ANALYSIS, TECHNICAL WRITING & CRYPTOGRAPHY Elementary Encryption Encryption overview Substitution ciphers Transpositions Symmetric & asymmetric encryption Stream & block ciphers Confusion & diffusion Data Encryption Standard (DES) AES Encryption Standard Public Key encryption: RSA Hash functions Practical applications of encryption (i.e. Bitcoins) Digital signatures Digital certificates Cryptanalysis & Control Breaking encryption schemes Tools & controls Analysis & Technical Writing Information analysis & synthesis Technical report writing MODULE 3: TECHNICAL SECURITY Program Security Flaws & fixing faults Program errors Targeted malicious code Controls against program threats Operating System Security Operating system flaws Memory and address protection Control access File protection User authentication Open source systems Network & Internet Security (6 hours) Network threats Controls Firewalls Intrusion Detection Systems

Intrusion Prevention Systems Email security Web security MODULE 4: SECURITY GOVERNANCE Laws, Rules & Regulations Local and International Rights of employees and employers Computer crime Privacy Ethical issues & case studies Security Policies, Plans & Procedures Military & commercial policies Policies in action Security models Security plans & procedures Security evaluation Security Design & Management Planning for security Planning for contingencies Developing the security program Security management models and practices Risk analysis & management Identifying & assessing risks Accessing & controlling risks Protection mechanisms Quality assurance (assessment, moderation, certification) Candidates will be assessed in the following manner: Attendance of contact sessions Participation on dedicated e-learning forum as per guidelines Online assessments Online projects Final Exam For successful completion of the certificate an attendee needs to obtain a passing mark of at least 70% for each module. Assessments are compiled as per University and industry requirements. Moderation will be conducted by experts from the University (F SATI), other academic institutions as well as industry. Certificates will be issued by CPUT and certificates will contain logos of all partners. Open Badges A digital badge is an online representation of a skill earned. Open Badges allows a person to verify their skills, interests and achievements through credible organizations. Badges are displayed on the web, shared for employment, education or lifelong learning. Open Badges is a new online standard to recognize and verify learning. Badges as per industry certification will be issued after successful completion of the certificate. Page 4 of 5

NQF Level NQF Level 5 Lecturers & Facilitators Prof. Elmarie Biermann (F SATI) will be the main facilitator. Partners 1. Cape Peninsula University of Technology (CPUT) is a leading University of Technology that provides a wide range of qualifications within the Western Cape. 2. French South African Institute of Technology (F SATI) offers international Master of Science and Doctorate programmes in Electronic Engineering in collaboration with ESIEE-Paris, a graduate school in electronic engineering in France. They focus on research and development within the nano-satellite sphere through the development of CubeSats. 3. CS Interactive Training provides training and support to teams of business and ICT professionals that are responsible for systems and business change management initiatives within organisations. Their goal is to enable organisations to build core competencies that enable the managing of change more effectively and reduce complexity within core processes and systems. They believe in long term partnerships that will effectively transfer skills and capabilities to staff. Our Out-of-the-Box working style allows us to identify additional training requirements and then incorporate this into our set works. 4. Boshoff Industries are leaders in Enterprise IT Security and Assessment Services. They provide security services such as penetration testing and vulnerability assessment to ensure corporate entities are safe, secure and adhering to national laws, standards and policies. Page 5 of 5