Cyber Security & IoT Project

 

Empowering Kosovo youth, with emphasis on young women and persons with disabilities to earn competitive and marketable Certifications on Cybersecurity and Internet of Things IoT.

- Application Deadline 12.09.2021 -
- Training Start Date 20.09.2021 -

.

Cybersecurity

Introduction to Cybersecurity & Cybersecurity Essential
100 hours

Digitization creates business value through digitized assets and expanded connectivity. But it is also increasing exposure to cyber attacks. The exponential growth of networked connections leaves data more vulnerable to attacks, creating a growing need for Cybersecurity skills and professionals.

Learn More Apply

About Cyber Security

Be Safe on Cyberspace

The Internet is a staple in many people's everyday lives. It is a great place fills with lots of information, but it is also full of dangers. Staying safe on Cyberspace is no longer an option as we have much to lose if we do not exercise caution. Introduction to Cybersecurity covers the importance of cybersecurity, awareness, data confidentiality and good practices when using the cyber space and social media. It walks students through every aspects of security in a broad, easy to understand way and explains the value of securing data, both personal and for businesses.

The course shows students the great demand for cybersecurity professionals and opportunities in pursuing a career in security.

The course modules define cybersecurity, explain why it’s important, the impact of cyber attacks, and introduce the processes used to secure data.

The course offers the following:

  • Interactive content
  • Activities and lab exercises that reinforce learning
  • Links to articles and websites to help you explore cybersecurity on your own
  • Quizzes to check your understanding of the information presented

Apply

Cybersecurity Careers

Training a cybersecurity workforce is a national priority for many countries, and the demand for cybersecurity professionals is projected to rise to six millions job openings globally by 2019. There are many opportunities for career growth in this field. As people become increasingly dependent on networks to store their personal, financial, and business data, there’s greater incentive for cybercriminals to steal or manipulate that data. The world needs people who are trained to proactively mitigate and address these threats. Introduction to Cybersecurity is delivered through the Cisco NetAcad.com learning environment. Students can self-enroll to take the course at your own pace. Instructors can enroll students and teach the course through the same process used for other NetAcad™ courses.

  • Explain the need and importance of cybersecurity.
  • Explain the characteristics and value of personal data, and data within an organization.
  • Recognize the characteristics and operation of a cyber attack.
  • Interpret the trends in the cyber threat landscape.
  • Understand how to protect devices from threats.
  • Master how to safeguard your privacy.
  • Learn techniques to protect organizations from cyber attacks.
  • Recognize the behavior-based approach to cybersecurity.
  • Explain Cisco’s approach to cybersecurity.
  • Understand legal and ethical issues in cybersecurity.
  • Explain the opportunities for pursuing an education and a career in cybersecurity.

About Cybersecurity Essentials

Cybersecurity Essentials At-A-Glance

Learn Cybersecurity Essentials Knowledge and Skills Cybersecurity leads media headline news – “New malware steals $4 million at U.S., Canada Banks”, “Hackers broke into hospitals despite software flaw warnings”, “Newer type of ransomware is harbinger of danger” (Source: Cisco 2016 Annual Security Report). Today, cybersecurity concerns everyone, from individuals to private business to country governments. Evolve your online safety knowledge; learn cybersecurity skills and choose a career in cybersecurity.

The Cybersecurity Essentials course covers foundational knowledge in all aspects of security in the cyber world, including information security, systems security, network security, mobile security, physical security, ethics and laws. It builds students’ skills in related technologies, procedures, defense and mitigation techniques used in protecting businesses.

    Cybersecurity Careers

    Training a cybersecurity workforce is a national priority for most countries, with a demand for cybersecurity professionals projected to rise to six millions job openings globally by 2021. There are many opportunities for career growth in this field. As people become increasingly dependent on networks to store their personal, financial, and business data, there’s greater incentive for cyber criminals to steal, manipulate, and monetize that data. The world needs specialists to proactively defend and address these threats. Cybersecurity Essentials is delivered through the Cisco NetAcad.com learning environment. Students can enroll into the self-paced course to take at their own pace or find an academy where instructors enroll students into the course and teach the through the same process used for other Cisco Networking Academy ™ courses.

    Apply

    Cybersecurity risks and threats are ever-present. The Internet and network infrastructures are increasingly vulnerable to a wide variety of physical and cyber attacks. Sophisticated cyber criminals and nations exploit these vulnerabilities stealing
    information, money, and more. These threats and vulnerabilities are fueling the growing need for skilled cybersecurity professionals.

    The course offers the following:

    • Interactive, multimedia content
    • Activities, lab exercises, Cisco Packet Tracer activities that reinforce learning
    • Links to articles and websites for enhanced learning on specific topics
    • Quizzes and exams to check students’ understanding of the information covered
    • Describe the cybersecurity world, criminals, and professionals.
    • Compare how cybersecurity threats affect individuals, business and countries.
    • Explain the structure and efforts committed to expanding the security workforce.
    • Explain the three dimensions of the McCumber Cube.
    • Detail the ISO cybersecurity model.
    • Explain the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
    • Describe tactics, techniques and procedures used by cyber criminals.
    • Explain the types of malware, malicious code and social engineering.
    • Outline technologies, products and procedures used to protect confidentiality.
    • Explain encryption techniques and access control techniques.
    • Present concepts of obscuring data.
    • Explain technologies, products and procedures used to ensure integrity.
    • Detail the purpose of digital signatures and certificates.
    • Explain the need for database integrity enforcement.
    • Explain the concepts of five nines.
    • Name the technologies, products, and procedures used to provide high availability.
    • Represent how incident response plan and disaster recovery planning improves high availability and business continuity.
    • Describe system, servers and data protection
    • Explain network infrastructure and end device protection
    • Detail physical security measures used to protect network equipment
    • Discuss cybersecurity domains and controls
    • Explain ethics and cybersecurity laws.
    • Name the cybersecurity tools.
    • Explain how to become a cybersecurity professional.
     
    .

    Internet of Things - IoT

    • Introduction to Internet of Things  
    • IoT Fundamentals: Connecting Things
    • IoT Fundamentals: Hackathon

    100 Hours
    Invest in learning IoT (Internet of Things) skills and you can transform any business in any industry, from manufacturing to saving endangered species. Imagine 26 billion people, systems, and physical objects connecting and sharing data seamlessly over the internet. This isn't a what if scenario, it's real-life and it’s coming together all around us right now. Learn how IoT is changing the world and the IoT skills you will need to land a well-paying job. No prerequisites required.)

    Learn More Apply

    About Internet of Things

    Introduction to IoT

    Invest in learning IoT (Internet of Things) skills and you can transform any business in any industry, from manufacturing to saving endangered species. Imagine 26 billion people, systems, and physical objects connecting and sharing data seamlessly over the internet. This isn't a what-if scenario, it's real-life and it’s coming together all around us right now. Learn how IoT is changing the world and the IoT skills you will need to land a well-paying job. No prerequisites required.

    • Learn how the current digital transformation is creating unprecedented economic opportunity.
    • Understand how the IoT is bridging the gap between operational and information technology systems.
    • Discover how standard business processes are being transformed.
    • The security concerns that must be considered when implementing IoT solutions.

    IoT Fundamentals: Connecting Things

    Nearly every object can now be connected to the Internet -- from washing machines to sophisticated components of an airplane’s jet engine, even organic items like crops and cows. The ability to connect things and capture useful data is transforming organizations in every industry and opening doors for new career specializations. Discover the basis of this exciting and emerging field using fun, hands-on activities to model securely connecting sensors to cloud services over IP networks and collecting data in an end-to-end IoT (Internet of Things) system. Basic programming (such as PCAP: Programming Essentials in Python), networking and electronics knowledge is recommended.

    • Learn how the current digital transformation is creating unprecedented economic opportunity.
    • Understand how the IoT is bridging the gap between operational and information technology systems.
    • Develop critical thinking and problem-solving skills using both real equipment and Cisco Packet Tracer.
    • Soft skills such as teamwork and articulating problems and solutions in a business context.

    IoT Fundamentals: Hackathon  

    After you've completed Connecting Things , it's time to create your own IoT solution using your new skills. Here you’ll form a Hackathon team and use professional tools and templates to define, design, and prototype an IoT solution. What really dials up the heat is that your team’s project will find a new way to solve a real-world problem! Not only will you prototype an IoT solution, but you'll also learn how to present it to a panel of industry experts and peers! Prerequisite IoT Fundamentals: Connecting Things and.

    • Identify a problem, create a design, then plan for an IoT solution.
    • Develop a prototype of an IoT solution.
    • Test and validate your prototype.
    • Present IoT concept and solution to experts.

     

    Apply

     
    .

    Join Us!

    Explore the possibilities, discover the unexpected.

    Take the first steps towards building your CV.

     

    Apply