{"id":10841,"date":"2024-11-22T20:12:51","date_gmt":"2024-11-22T20:12:51","guid":{"rendered":"https:\/\/www.wcsu.edu\/asb\/?page_id=10841"},"modified":"2024-12-04T18:28:27","modified_gmt":"2024-12-04T18:28:27","slug":"foundations-of-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.wcsu.edu\/asb\/certificates\/foundations-of-cybersecurity\/","title":{"rendered":"Foundations of Cybersecurity Certificate"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10841\" class=\"elementor elementor-10841\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ead4b7 e-con-full e-flex elementor-invisible e-con e-parent\" data-id=\"8ead4b7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fd2a5c6 e-flex e-con-boxed e-con e-child\" data-id=\"fd2a5c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9e4814f e-con-full e-flex e-con e-child\" data-id=\"9e4814f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8eca5ae elementor-widget elementor-widget-heading\" data-id=\"8eca5ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Foundations of <br>Cybersecurity Certificate<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-108d639 elementor-widget elementor-widget-heading\" data-id=\"108d639\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Next Start Date: January 7, 2025<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f006a7 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"0f006a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-631da1d e-con-full e-flex e-con e-child\" data-id=\"631da1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49325c4 elementor-widget elementor-widget-heading\" data-id=\"49325c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">ANCELL SCHOOL OF BUSINESS<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e567859 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e567859\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-827dc25 elementor-widget elementor-widget-heading\" data-id=\"827dc25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enhance your Cybersecurity Skills for Today's Digital Landscape<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7c7376 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d7c7376\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d7342f elementor-widget elementor-widget-text-editor\" data-id=\"2d7342f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #002856;\"><b>Program Overview<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e284ee elementor-widget elementor-widget-text-editor\" data-id=\"8e284ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This Foundation of Cybersecurity course provides participants with a comprehensive introduction to the fundamentals of cybersecurity. Topics include an exploration of cybersecurity concepts, tools, technologies, and industry best practices. Participants will engage in hands-on activities to develop practical skills, such as risk assessment, incident response, and security controls implementation. Through interactive exercises and simulated scenarios, students will gain confidence in addressing cybersecurity threats and understanding the strategies to safeguard digital assets in diverse organizational contexts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fc680e elementor-widget elementor-widget-text-editor\" data-id=\"3fc680e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #002856;\"><strong>Certificate Course Objective<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7deedbd elementor-widget elementor-widget-text-editor\" data-id=\"7deedbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand the foundational aspects of cybersecurity, including its importance to organizations, the roles of cybersecurity professionals, and the cybersecurity job market (M1).<\/li><li>Trace the historical development of cybersecurity, exploring key events, notable threats like the Brain Virus and Morris Worm, and the formation of response teams such as CERTs (M1).<\/li><li>Explain core cybersecurity concepts, including threats, vulnerabilities, and the CIA Triad, emphasizing their relevance in risk assessment (M1).<\/li><li>Identify and differentiate between various types of cyber threats, including internal\/external threats and specific malware like viruses, worms, spyware, and ransomware (M2).<\/li><li>Recognize and evaluate social engineering techniques, explaining their effectiveness and providing real-world examples of successful attacks (M2).<\/li><li>Describe and implement cybersecurity frameworks, such as the NIST Cybersecurity Framework, GDPR, and ISO standards, detailing their goals, guidelines, and processes for risk management (M3).<\/li><li>Identify critical assets and risks, apply security controls, and provide examples of effective framework implementations in organizations (M3).<\/li><li>Configure and manage security controls, including access controls, firewalls, and intrusion detection\/prevention systems, while using tools like Wireshark for network analysis (M4).<\/li><li>Understand and comply with cybersecurity regulations, discussing the consequences of non-compliance and how to align organizational practices with HIPAA, PCI DSS, and other standards (M4).<\/li><li>Detail the phases of incident management, from detection to recovery, and explain the role of cybersecurity analysts in managing and mitigating breaches (M5).<\/li><li>Use tools for monitoring network activity, such as SIEM systems, to detect and respond to cyber threats effectively (M5).<\/li><li>Discuss ethical considerations and emerging trends in cybersecurity, including how confidentiality, privacy, AI, blockchain, and cloud computing affect the current and future landscape of cybersecurity (M6).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a436a6 e-con-full e-flex e-con e-child\" data-id=\"6a436a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2e0f2d2 e-flex e-con-boxed e-con e-child\" data-id=\"2e0f2d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-75fd8f1 e-con-full e-flex e-con e-child\" data-id=\"75fd8f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c8890d7 e-con-full e-flex e-con e-child\" data-id=\"c8890d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55fc6d1 elementor-position-top elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"55fc6d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"861\" height=\"640\" src=\"https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/microcredential-badge-FOC.png\" class=\"attachment-full size-full wp-image-10766\" alt=\"WCSU Micro-Credential Foundations of Cybersecurity\" srcset=\"https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/microcredential-badge-FOC.png 861w, https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/microcredential-badge-FOC-300x223.png 300w, https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/microcredential-badge-FOC-768x571.png 768w\" sizes=\"(max-width: 861px) 100vw, 861px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Certificate will lead to a Micro-Credential<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b364022 e-con-full e-flex e-con e-child\" data-id=\"b364022\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d87ce33 e-con-full e-flex e-con e-child\" data-id=\"d87ce33\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9401f6 premium-lq__none elementor-widget elementor-widget-premium-addon-button\" data-id=\"d9401f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t<a class=\"premium-button premium-button-style1 premium-btn-block premium-button-style1-right\" href=\"https:\/\/workforce.charteroak.edu\/search\/publicCourseSearchDetails.do?method=load&#038;courseId=1050055&#038;selectedProgramAreaId=1050081&#038;selectedProgramStreamId=\">\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\tREGISTRATION IS OPEN\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/a>\n\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73a9ca6 e-con-full e-flex e-con e-child\" data-id=\"73a9ca6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb6ccd6 elementor-mobile-align-start elementor-tablet-align-start elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"eb6ccd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wcsu.edu\/asb\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ancell School of Business<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wcsu.edu\/cybersecurity\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">CYBERSECURITY<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55beef9 elementor-mobile-align-start elementor-tablet-align-start elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"55beef9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">FOUNDATIONS OF CYBERSECURITY CERTIFICATE<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc11e12 e-con-full e-flex e-con e-child\" data-id=\"dc11e12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7b88104 e-con-full e-flex e-con e-child\" data-id=\"7b88104\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-gbadge=\"{&quot;text&quot;:&quot;Hybrid Learning Model&quot;,&quot;hideIfEmpty&quot;:false,&quot;icon&quot;:false}\" class=\"elementor-element elementor-element-b42aec2 elementor-hidden-tablet elementor-hidden-mobile premium-gbadge-yes premium-gbadge-flag premium-gbadge-left elementor-widget elementor-widget-image\" data-id=\"b42aec2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"300\" src=\"https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/JLA-class.jpg\" class=\"attachment-full size-full wp-image-9973\" alt=\"Ancell School of Business\" srcset=\"https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/\/JLA-class.jpg 500w, https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/\/JLA-class-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f40ff47 elementor-widget elementor-widget-heading\" data-id=\"f40ff47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><b>Time Commitment:<\/b> <br>Flexible scheduling with evening in-person sessions and online learning modules.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c3f1f2 e-con-full e-flex e-con e-child\" data-id=\"8c3f1f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3f6321b e-con-full e-flex e-con e-child\" data-id=\"3f6321b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-39aa991 e-con-full e-flex e-con e-child\" data-id=\"39aa991\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6ccff1d e-con-full e-flex e-con e-child\" data-id=\"6ccff1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8850638 elementor-widget elementor-widget-image\" data-id=\"8850638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"333\" height=\"279\" src=\"https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/Shahab-e1732303290406.jpg\" class=\"attachment-large size-large wp-image-10977\" alt=\"Shahab S. Band\" srcset=\"https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/Shahab-e1732303290406.jpg 333w, https:\/\/www.wcsu.edu\/asb\/wp-content\/uploads\/sites\/12\/Shahab-e1732303290406-300x251.jpg 300w\" sizes=\"(max-width: 333px) 100vw, 333px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-352b1b4 e-con-full e-flex e-con e-child\" data-id=\"352b1b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29294a8 elementor-widget elementor-widget-heading\" data-id=\"29294a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Shahab S. Band<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-553cebe elementor-widget elementor-widget-text-editor\" data-id=\"553cebe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"text-decoration: underline;\">Instructor<\/span><br \/><\/strong>email: <a href=\"mailto:bands@wcsu.edu\"><span class=\"s1\">bands@wcsu.edu<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c12bf2 e-flex e-con-boxed e-con e-parent\" data-id=\"3c12bf2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5486022 e-con-full e-flex e-con e-child\" data-id=\"5486022\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ff83c8 elementor-widget elementor-widget-text-editor\" data-id=\"8ff83c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"text-decoration: underline;\"><span style=\"color: #002856; text-decoration: underline;\"><strong>Certificate Modules<\/strong>\u00a0<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f91dc60 e-con-full e-flex e-con e-child\" data-id=\"f91dc60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f482bd9 premium-table-dir-ltr elementor-widget elementor-widget-premium-tables-addon\" data-id=\"f482bd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_table_responsive&quot;:&quot;yes&quot;}\" data-widget_type=\"premium-tables-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-table-wrap premium-table-responsive\">\r\n\t\t\t\r\n\t\t\t<table class=\"premium-table\" data-settings=\"{&quot;sort&quot;:false,&quot;usNumbers&quot;:false,&quot;sortMob&quot;:false,&quot;search&quot;:false,&quot;records&quot;:false,&quot;dataType&quot;:&quot;custom&quot;,&quot;csvFile&quot;:null,&quot;firstRow&quot;:null,&quot;separator&quot;:null,&quot;pagination&quot;:&quot;&quot;,&quot;rows&quot;:0}\" >\r\n\r\n\t\t\t\r\n\t\t<thead class=\"premium-table-head\">\r\n\r\n\t\t\t<tr class=\"premium-table-row\">\r\n\r\n\t\t\t\t<th class=\"premium-table-cell elementor-repeater-item-023f0cc\"><span class=\"premium-table-text\">#<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-3d69219\"><span class=\"premium-table-text\">Date<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-41181cf\"><span class=\"premium-table-text\">Time<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-5b43e43\"><span class=\"premium-table-text\">Delivery<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-5217804\"><span class=\"premium-table-text\">Module\/Activities<\/span><\/th>\r\n\t\t\t<\/tr>\r\n\r\n\t\t<\/thead>\r\n\r\n\t\t\t\t<tbody class=\"premium-table-body\">\r\n\t\t\t\t\t\t<tr class=\"premium-table-row elementor-repeater-item-a35355b\"><td class=\"premium-table-cell elementor-repeater-item-17acf9e\"><span class=\"premium-table-text\">1<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-621af5a\"><span class=\"premium-table-text\">01\/07\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-cdae8b7\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-24198d5\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-d244136\"><span class=\"premium-table-text\">M1: Foundations of Cybersecurity<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-29818b0\"><td class=\"premium-table-cell elementor-repeater-item-b2e6c4a\"><span class=\"premium-table-text\">2<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-28b674c\"><span class=\"premium-table-text\">01\/08\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-804f051\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-028c5a0\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-06cfaa1\"><span class=\"premium-table-text\">M2: Understanding Cyber Threats and Social Engineering<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-69e75ee\"><td class=\"premium-table-cell elementor-repeater-item-2662468\"><span class=\"premium-table-text\">3<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-6cb101e\"><span class=\"premium-table-text\">01\/14\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-2fb263e\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-3073fa7\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-e84b3b2\"><span class=\"premium-table-text\">M3: Cybersecurity Frameworks and Risk Management<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-24e9fcf\"><td class=\"premium-table-cell elementor-repeater-item-28871ed\"><span class=\"premium-table-text\">4<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-f03c01f\"><span class=\"premium-table-text\">01\/15\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-1a61098\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-ef61160\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-44a61b6\"><span class=\"premium-table-text\">M4: Security Controls and Compliance<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-a205e81\"><td class=\"premium-table-cell elementor-repeater-item-3decb1b\"><span class=\"premium-table-text\">5<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-ed0456e\"><span class=\"premium-table-text\">01\/21\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-3ac8b3d\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-9251928\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-bc3caa2\"><span class=\"premium-table-text\">M5: Incident Detection and Response<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-8a06574\"><td class=\"premium-table-cell elementor-repeater-item-56ee9cc\"><span class=\"premium-table-text\">6<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-c02f0e3\"><span class=\"premium-table-text\">01\/22\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-1e40431\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-46fb9d3\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-f81f3f4\"><span class=\"premium-table-text\">M6: Ethical and Emerging Topics in Cybersecurity<\/span><\/td>\t\t\t<\/tr>\r\n\t\t<\/tbody>\r\n\r\n\t\t\r\n\t\t\t<\/table>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6870674 e-con-full e-flex e-con e-child\" data-id=\"6870674\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a39ca82 elementor-widget elementor-widget-text-editor\" data-id=\"a39ca82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"text-decoration: underline;\"><span style=\"color: #002856;\"><strong>Detailed Outline<\/strong><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fb7a2e e-con-full e-flex e-con e-child\" data-id=\"0fb7a2e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ae601e e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"7ae601e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"128868382\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1288683821\" data-tab-title-id=\"e-n-tab-title-1288683821\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1288683821\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM1\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1288683822\" data-tab-title-id=\"e-n-tab-title-1288683822\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1288683822\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM2\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1288683823\" data-tab-title-id=\"e-n-tab-title-1288683823\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1288683823\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM3\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1288683824\" data-tab-title-id=\"e-n-tab-title-1288683824\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1288683824\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM4\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1288683825\" data-tab-title-id=\"e-n-tab-title-1288683825\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1288683825\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM5\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1288683826\" data-tab-title-id=\"e-n-tab-title-1288683826\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1288683826\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM6\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1288683821\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1288683821\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-f7be930 e-con-full e-flex e-con e-child\" data-id=\"f7be930\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a8316c4 e-flex e-con-boxed e-con e-child\" data-id=\"a8316c4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d468e71 elementor-widget elementor-widget-heading\" data-id=\"d468e71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M1: Foundations of Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f336f71 elementor-widget elementor-widget-text-editor\" data-id=\"f336f71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Introduction<\/strong><ul><li>Definition of cybersecurity and its importance in organizations.<\/li><li>Role of cybersecurity professionals.<\/li><li>Overview of the cybersecurity job market and career paths.<\/li><\/ul><\/li><li><strong>Historical Context<\/strong><ul><li>Evolution of cybersecurity threats (e.g., Brain Virus, Morris Worm).<\/li><li>Development of Computer Emergency Response Teams (CERTs).<\/li><\/ul><\/li><li><strong>Key Concepts<\/strong><ul><li>Threats, vulnerabilities, and risks.<\/li><li>CIA Triad: Confidentiality, Integrity, Availability.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1288683822\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1288683822\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-37dcce2 e-con-full e-flex e-con e-child\" data-id=\"37dcce2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-95a61ca e-flex e-con-boxed e-con e-child\" data-id=\"95a61ca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc026cb elementor-widget elementor-widget-heading\" data-id=\"fc026cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M2: Understanding Cyber Threats and Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3d61d7 elementor-widget elementor-widget-text-editor\" data-id=\"d3d61d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Types of Threats<\/strong><ul><li>Internal vs. External threats.<\/li><li>Malware (viruses, worms, ransomware, spyware).<\/li><\/ul><\/li><li><strong>Social Engineering<\/strong><ul><li>Tactics (phishing, vishing, smishing, baiting, physical impersonation).<\/li><li>Why social engineering is effective (authority, urgency, familiarity).<\/li><li>Case studies: LoveLetter attack, Equifax breach.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1288683823\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1288683823\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-79fa16a e-con-full e-flex e-con e-child\" data-id=\"79fa16a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2b3a810 e-flex e-con-boxed e-con e-child\" data-id=\"2b3a810\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08a430b elementor-widget elementor-widget-heading\" data-id=\"08a430b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M3: Cybersecurity Frameworks and Risk Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7d8692 elementor-widget elementor-widget-text-editor\" data-id=\"b7d8692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Security Frameworks<\/strong><ul><li>Overview: NIST Cybersecurity Framework (CSF), GDPR, ISO standards.<\/li><li>Core components: Goals, guidelines, processes, monitoring.<\/li><\/ul><\/li><li><strong>Risk Management<\/strong><ul><li>Identifying critical assets and risks.<\/li><li>Applying controls to mitigate risks.<\/li><li>Real-world examples of framework implementation.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1288683824\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1288683824\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-4d828fe e-flex e-con-boxed e-con e-child\" data-id=\"4d828fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cabeb66 e-con-full e-flex e-con e-child\" data-id=\"cabeb66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41305f3 elementor-widget elementor-widget-heading\" data-id=\"41305f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M4: Security Controls and Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8234209 elementor-widget elementor-widget-text-editor\" data-id=\"8234209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Security Controls<\/strong><ul><li>Access controls, firewalls, intrusion detection\/prevention systems.<\/li><li>Security tools and techniques (Wireshark).<\/li><\/ul><\/li><li><strong>Compliance and Regulations<\/strong><ul><li>Overview of key regulations: HIPAA, PCI DSS, GDPR.<\/li><li>U.S.-specific regulations: FERC-NERC, FedRAMP.<\/li><li>Consequences of non-compliance.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1288683825\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1288683825\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-1aa6f1b e-flex e-con-boxed e-con e-child\" data-id=\"1aa6f1b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e6251e e-con-full e-flex e-con e-child\" data-id=\"6e6251e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d963af elementor-widget elementor-widget-heading\" data-id=\"0d963af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M5: Incident Detection and Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50eb486 elementor-widget elementor-widget-text-editor\" data-id=\"50eb486\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Incident Management<\/strong><ul><li>Phases: Detection, containment, investigation, recovery.<\/li><li>Role of the security analyst during breaches.<\/li><\/ul><\/li><li><strong>Tools and Techniques<\/strong><ul><li>Network activity monitoring, SIEM tools.<\/li><li>Case study: Managing data breaches.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1288683826\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1288683826\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-2f1f08e e-flex e-con-boxed e-con e-child\" data-id=\"2f1f08e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-051b04f e-con-full e-flex e-con e-child\" data-id=\"051b04f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0878924 elementor-widget elementor-widget-heading\" data-id=\"0878924\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M6: Ethical and Emerging Topics in Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e56f22 elementor-widget elementor-widget-text-editor\" data-id=\"1e56f22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Ethical Considerations<\/strong><ul><li>Confidentiality, privacy, and ethical decision-making.<\/li><li>Avoiding conflicts of interest.<\/li><\/ul><\/li><li><strong>Emerging Trends<\/strong><ul><li>Cloud security, blockchain, AI in cybersecurity.<\/li><li>Preparing for future roles: Certifications and skill-building (e.g., Python automation).<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c67cbb6 e-flex e-con-boxed e-con e-parent\" data-id=\"c67cbb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-569f03d e-con-full e-flex e-con e-child\" data-id=\"569f03d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d376d38 e-con-full e-flex e-con e-child\" data-id=\"d376d38\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37d4f91 elementor-widget elementor-widget-text-editor\" data-id=\"37d4f91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #002856;\">Certificate Learning Outcomes<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6356871 elementor-widget elementor-widget-text-editor\" data-id=\"6356871\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upon successful completion of the Foundation of Cybersecurity Certificate, learners will be able to:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a229db e-con-full e-flex e-con e-child\" data-id=\"6a229db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d7682f9 e-con-full e-flex e-con e-child\" data-id=\"d7682f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fdc1b4 elementor-widget elementor-widget-text-editor\" data-id=\"1fdc1b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Define and explain fundamental cybersecurity concepts, including the definitions of cybersecurity, threats, vulnerabilities, and the CIA Triad (Confidentiality, Integrity, Availability).<\/li><li>Analyze historical and modern cybersecurity threats, understanding the evolution of attacks and the importance of Computer Emergency Response Teams (CERTs).<\/li><li>Identify and assess various cyber threats, including internal vs. external threats and common malware types (viruses, ransomware, etc.).<\/li><li>Explain social engineering tactics, why they are effective, and how they impact organizational security, referencing case studies like the LoveLetter attack and the Equifax breach.<\/li><li>Interpret and implement security frameworks and risk management strategies, such as the NIST Cybersecurity Framework, GDPR, and ISO standards, to mitigate risks in real-world scenarios.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f7807a e-con-full e-flex e-con e-child\" data-id=\"1f7807a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17dca0c elementor-widget elementor-widget-text-editor\" data-id=\"17dca0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Apply security controls and use cybersecurity tools, including access controls, firewalls, and Wireshark, to detect and prevent cyber threats.<\/li><li>Understand compliance and regulatory requirements, including key U.S. and international regulations like HIPAA, PCI DSS, FERC-NERC, and GDPR, and their impact on organizational security practices.<\/li><li>Manage cybersecurity incidents, following the phases of detection, containment, investigation, and recovery, and using relevant tools like SIEM systems for data breach management.<\/li><li>Discuss ethical considerations in cybersecurity, focusing on confidentiality, privacy, and avoiding conflicts of interest in decision-making.<\/li><li>Analyze and adapt to emerging trends in cybersecurity, such as AI, blockchain, and cloud security, while identifying skills and certifications needed for future roles in the field.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-941ebf5 e-flex e-con-boxed e-con e-parent\" data-id=\"941ebf5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e9c41ee e-con-full e-flex e-con e-child\" data-id=\"e9c41ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8226176 elementor-widget elementor-widget-text-editor\" data-id=\"8226176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\"><strong>Assessment Plan<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56089c0 elementor-widget elementor-widget-text-editor\" data-id=\"56089c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">The following assessment instruments will be used to evaluate the participants&#8217; learning outcomes and overall understanding of the Foundation of Cybersecurity concepts.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4f6a4f e-con-full e-flex e-con e-child\" data-id=\"d4f6a4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-003c647 e-con-full e-flex e-con e-child\" data-id=\"003c647\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed4795e elementor-widget elementor-widget-heading\" data-id=\"ed4795e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Mid-Program Assessment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51a85c4 elementor-widget elementor-widget-text-editor\" data-id=\"51a85c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">This assessment will be conducted after the completion of Module 4 to gauge participants&#8217; progress and understanding of the first half of the program.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46630e7 e-con-full e-flex e-con e-child\" data-id=\"46630e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9c257 elementor-widget elementor-widget-heading\" data-id=\"5c9c257\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"> 2. Final Assessment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b40452 elementor-widget elementor-widget-text-editor\" data-id=\"8b40452\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">This comprehensive assessment will be conducted at the end of the program.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67daa1c e-con-full e-flex e-con e-child\" data-id=\"67daa1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c146fac elementor-widget elementor-widget-heading\" data-id=\"c146fac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Participation and Engagement <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9a0ac3 elementor-widget elementor-widget-text-editor\" data-id=\"b9a0ac3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">Assess participants&#8217; overall engagement throughout the program including attendance for in-person modules and participation in online discussions and activities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Foundations of Cybersecurity Certificate Next Start Date: January 7, 2025 ANCELL SCHOOL OF BUSINESS Enhance your Cybersecurity Skills for Today&#8217;s Digital Landscape Program Overview This Foundation of Cybersecurity course provides participants with a comprehensive introduction to the fundamentals of cybersecurity. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10635,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-wcsu.php","meta":{"footnotes":""},"class_list":["post-10841","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/pages\/10841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/comments?post=10841"}],"version-history":[{"count":0,"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/pages\/10841\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/pages\/10635"}],"wp:attachment":[{"href":"https:\/\/www.wcsu.edu\/asb\/wp-json\/wp\/v2\/media?parent=10841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}