Cybersecurity Core Concepts Micro-credential
Issued by
Purdue University Global
The cybersecurity core concepts micro-credential provides you with a foundational understanding of the important areas of cybersecurity to include ethical hacking, forensics, cryptography, and IT systems auditing and assessments.
- Type Learning
- Level Advanced
- Time Months
- Cost Paid
Skills
- Cybersecurity
Earning Criteria
-
IT537: Introduction to Cybersecurity. An overview of data confidentiality, integrity, and availability, and the systems and applications. Examines methods for network situational awareness and dynamic decision-making for predicting and assessing the impact of various cyberattacks. Aspects of cyber-strong organizational structures and mitigation are emphasized. Also covers risk assessment methodologies, organizational preparedness and gap areas, and improvement processes.
-
IT542: Ethical Hacking and Network Defense. An ethical hacker is a security expert who attacks a system on behalf of the system's owners. This course focuses on discovering network vulnerabilities that a malicious hacker can exploit. It explores penetration testing, footprinting and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack web servers and wireless networks. You will perform hands-on projects.
-
IT543: Cryptography Concepts and Techniques. In this course, you will learn how to protect susceptible networks from attack by implementing encryption techniques. You will examine encryption algorithms, substitution and transposition, block ciphers versus stream ciphers, public key cryptography, hash functions, digital signatures, and authentication protocols. The course offers hands-on projects using modern cryptographic tools.
-
IT550: Computer Forensics and Investigations. This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches.
-
IT591: IT Security Auditing and Assessments. This course covers standards and IT security audit processes, security controls, and governance of compliance and control responsibilities. Covers the Sarbanes-Oxley Act, General Computing Controls, the Gramm-Leach-Bliley Act (GLBA), the Federal Information Security Management Act (FISMA), and the Payment Card Industry Data Security Standard (PCI DSS), and you will become familiar with these standards and regulations.