inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
Start Date
Medium of studying
Duration
4 months
Program Facts
Program Details
Degree
Foundation
Major
Network Administration | Network Security | Cybersecurity
Area of study
Information and Communication Technologies
Timing
Full time
Course Language
English
About Program

Program Overview


Through a blended learning approach, participants gain theoretical knowledge and practical skills in network security, cyberattack methodologies, and incident response procedures. The program prepares graduates for careers in cybersecurity, including roles such as Network Security Engineer, Security Analyst, and Penetration Tester.

Program Outline


(Degree Overview: )

This 19-week, full-time program provides participants with an in-depth understanding of the tools and techniques used to create, implement, monitor, and detect cyberattacks. Through a comprehensive curriculum, students gain a deep understanding of the operation of network protocols and services while exploring various attack scenarios.


Outline:

  • Content:
  • Network security concepts, protocols, and technologies
  • Cyberattack methodologies, tools, and tactics
  • Network monitoring, analysis, and detection techniques
  • Network device security management and hardening
  • Structure:
  • The program consists of a series of lectures, practical sessions, and assessments designed to equip students with the knowledge and skills required for success in the cyber security field.
  • Through practical application of concepts learned in the theoretical sessions, participants gain hands-on experience in real-world scenarios.

Course Schedule:

  • The course schedule will be available on request
  • Network Security Concepts and Protocols:
  • Focuses on understanding network security protocols such as firewalls, VPNs, and intrusion detection and prevention systems (IDS/IPS).
  • Network Traffic Analysis and Monitoring:
  • This module equips students with the ability to interpret network traffic patterns, identify anomalies, and monitor network behavior. Teaches the steps involved in effective cybersecurity incident response. This includes incident identification, containment, analysis, remediation, and post-incident reporting.
  • Cyberattack Techniques and Tools:
  • Explores various cyberattack methods and tools commonly employed by malicious actors.
  • Security Device Management and Hardening:
  • Provides students with a thorough understanding of security device configuration and management techniques.
  • The format and schedule for the Assessments are not specified within the context, however, they will likely encompass a combination of:
  • Written examinations:
  • These tests may include multiple-choice questions, short-answer questions, and essay-style questions. They are designed to assess participants' theoretical understanding of cybersecurity principles.
  • Practical exercises:
  • Participants are required to complete practical assignments that demonstrate their ability to apply their knowledge to real-world scenarios. These exercises may involve configuring security devices, analyzing network traffic, and responding to cybersecurity threats. This methodology aims to create a comprehensive learning environment for the participants to gain theoretical and practical skills simultaneously.

Faculty

  • The teaching team is not explicitly described, however, it can be presumed to consist of highly experienced cybersecurity professionals and educators who possess extensive expertise in the field and possess the ability to deliver complex concepts effectively and guide participants in their learning journeys.
  • Participants engage in collaborative projects that involve the analysis and mitigation of cybersecurity threats faced by actual organizations.
  • This fosters critical thinking skills, teamwork abilities, and the capacity to solve problems creatively, all while exposing students to real-world cybersecurity scenarios.

Careers:

  • Network Security Engineer
  • Security Analyst
  • Security Architect
  • Penetration Tester
  • Security Operations Center (SOC) Analyst

Other:

  • The program is delivered in English and requires participants to demonstrate English proficiency before commencing their studies.
  • While not explicitly stated within the context, participants can also anticipate completing a capstone project to showcase their skills and integrate the acquired knowledge and expertise.
  • This project will likely be an in-depth investigation and solution development in response to a specific cybersecurity challenge, providing a valuable opportunity to showcase the learned skills and prepare for professional success.
  • Graduates can anticipate high employability in various industries and organizations as cybersecurity continues to be a rapidly growing field with an increasing demand for qualified professionals.
SHOW MORE
How can I help you today?