

Unit 1 Introduction to Cybersecurity and Networking
| 1.1 | Introduction to Cybersecurity |
| 1.2 | Personal Digital Security |
| 1.3 | Enterprise Security |
| 1.4 | Introduction to Computer System |
| 1.5 | Introduction to Command Line |
| 1.6 | Introduction to Networks |
| 1.7 | SOHO vs Enterprise Network |
Unit 1 Breakdown
1.1: Introduction to Cybersecurity
- 1.1A Describe the impacts of cybersecurity on individuals, organizations, governments, and critical infrastructure.
- 1.1B Describe the foundational concepts of confidentiality integrity, and availability in cybersecurity.
1.2: Personal Digital Security
- 1.2A Explain how an individual can limit the risk of identity theft, credit card fraud, and stolen login credentials
- 1.2B Apply password security practices that can prevent an unauthorized user from accessing an individual’s online accounts
- 1.3C Explain how practicing secure software behaviors can protect an individuals data
Unit 2 Layers, Protocols, and Addressing
| 2.1 | OSI and TCP/IP Models |
| 2.2 | Introduction to Protocols and Servers |
| 2.3 | Cabling |
| 2.4 | Network Topologies |
| 2.5 | Physical Addressing |
| 2.6 | Logical Addressing |
| 2.7 | IP Configuration |
Unit 3 Configuring a LAN
| 3.1 | Switching |
| 3.2 | Switching Security |
| 3.3 | More on Protocols |
| 3.4 | LAN Configuration and Toubleshooting |
Unit 4 Advanced LAN Topics
| 4.1 | IPv4 Addressing |
| 4.2 | Routing |
| 4.3 | Subnetting |
| 4.4 | Wireless Network |
| 4.5 | Network Troubleshooting |
Unit 5 Network Security
| 5.1 | Introduction to Security Controls |
| 5.2 | Physical and Administrative Controls |
| 5.3 | Technical Controls: Firewalls |
| 5.4 | Technical Controls: Network Segmentation |
| 5.5 | Technical Controls: Network Monitoring |
| 5.6 | Defense in Depth |