{"id":903,"date":"2024-12-05T17:36:50","date_gmt":"2024-12-05T17:36:50","guid":{"rendered":"https:\/\/www.wcsu.edu\/sgics\/?page_id=903"},"modified":"2026-01-05T18:12:42","modified_gmt":"2026-01-05T18:12:42","slug":"foundations-cybersecurity-certificate","status":"publish","type":"page","link":"https:\/\/www.wcsu.edu\/sgics\/workforce-education-and-lifelong-learning\/foundations-cybersecurity-certificate\/","title":{"rendered":"Foundations of Cybersecurity Certificate"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"903\" class=\"elementor elementor-903\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15f1805e e-con-full e-flex elementor-invisible e-con e-parent\" data-id=\"15f1805e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2eb3b74f e-flex e-con-boxed e-con e-child\" data-id=\"2eb3b74f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd95e5 e-con-full e-flex e-con e-child\" data-id=\"dd95e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79893cc8 elementor-widget elementor-widget-heading\" data-id=\"79893cc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Foundations of Cybersecurity\nCertificate Program<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-654ef05a elementor-widget elementor-widget-heading\" data-id=\"654ef05a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">TBA<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39a924d7 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"39a924d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-616a5fb7 e-con-full e-flex e-con e-child\" data-id=\"616a5fb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-387806c7 elementor-widget elementor-widget-heading\" data-id=\"387806c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">SCHOOL OF Graduate, International and Career Studies<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5723ca10 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5723ca10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25784463 elementor-widget elementor-widget-heading\" data-id=\"25784463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enhance your Cybersecurity Skills for Today's Digital Landscape<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44aa2662 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"44aa2662\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6216ad1d elementor-widget elementor-widget-text-editor\" data-id=\"6216ad1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #002856\"><b>Program Overview<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5076722c elementor-widget elementor-widget-text-editor\" data-id=\"5076722c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This Foundation of Cybersecurity course provides participants with a comprehensive introduction to the fundamentals of cybersecurity. Topics include an exploration of cybersecurity concepts, tools, technologies, and industry best practices. Participants will engage in hands-on activities to develop practical skills, such as risk assessment, incident response, and security controls implementation. Through interactive exercises and simulated scenarios, students will gain confidence in addressing cybersecurity threats and understanding the strategies to safeguard digital assets in diverse organizational contexts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-454b9bd0 elementor-widget elementor-widget-text-editor\" data-id=\"454b9bd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #002856\"><strong>Certificate Objectives<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61b9033d elementor-widget elementor-widget-text-editor\" data-id=\"61b9033d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand the foundational aspects of cybersecurity, including its importance to organizations, the roles of cybersecurity professionals, and the cybersecurity job market (M1).<\/li><li>Trace the historical development of cybersecurity, exploring key events, notable threats like the Brain Virus and Morris Worm, and the formation of response teams such as CERTs (M1).<\/li><li>Explain core cybersecurity concepts, including threats, vulnerabilities, and the CIA Triad, emphasizing their relevance in risk assessment (M1).<\/li><li>Identify and differentiate between various types of cyber threats, including internal\/external threats and specific malware like viruses, worms, spyware, and ransomware (M2).<\/li><li>Recognize and evaluate social engineering techniques, explaining their effectiveness and providing real-world examples of successful attacks (M2).<\/li><li>Describe and implement cybersecurity frameworks, such as the NIST Cybersecurity Framework, GDPR, and ISO standards, detailing their goals, guidelines, and processes for risk management (M3).<\/li><li>Identify critical assets and risks, apply security controls, and provide examples of effective framework implementations in organizations (M3).<\/li><li>Configure and manage security controls, including access controls, firewalls, and intrusion detection\/prevention systems, while using tools like Wireshark for network analysis (M4).<\/li><li>Understand and comply with cybersecurity regulations, discussing the consequences of non-compliance and how to align organizational practices with HIPAA, PCI DSS, and other standards (M4).<\/li><li>Detail the phases of incident management, from detection to recovery, and explain the role of cybersecurity analysts in managing and mitigating breaches (M5).<\/li><li>Use tools for monitoring network activity, such as SIEM systems, to detect and respond to cyber threats effectively (M5).<\/li><li>Discuss ethical considerations and emerging trends in cybersecurity, including how confidentiality, privacy, AI, blockchain, and cloud computing affect the current and future landscape of cybersecurity (M6).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e2829f4 e-con-full e-flex e-con e-child\" data-id=\"7e2829f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-49171d8a e-flex e-con-boxed e-con e-child\" data-id=\"49171d8a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-44b2fc0 e-con-full e-flex e-con e-child\" data-id=\"44b2fc0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4515eb76 e-con-full e-flex e-con e-child\" data-id=\"4515eb76\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-614f0329 elementor-position-top elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"614f0329\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"861\" height=\"640\" src=\"https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/micro-credential-badge.png\" class=\"attachment-full size-full wp-image-1076\" alt=\"micro-credential badge Foundations of Cybersecurity\" srcset=\"https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/micro-credential-badge.png 861w, https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/micro-credential-badge-300x223.png 300w, https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/micro-credential-badge-768x571.png 768w\" sizes=\"(max-width: 861px) 100vw, 861px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Certificate will lead to a Micro-Credential<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c97e010 e-con-full e-flex e-con e-child\" data-id=\"6c97e010\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-194b6639 e-con-full e-flex e-con e-child\" data-id=\"194b6639\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4572e787 premium-lq__none elementor-widget elementor-widget-premium-addon-button\" data-id=\"4572e787\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t<a class=\"premium-button premium-button-style1 premium-btn-block premium-button-style1-right\" href=\"https:\/\/workforce.charteroak.edu\/search\/publicCourseSearchDetails.do?method=load&#038;courseId=1050055&#038;selectedProgramAreaId=1050081&#038;selectedProgramStreamId=\">\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\tRegisteration Closed\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/a>\n\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bd45d89 e-con-full e-flex e-con e-child\" data-id=\"2bd45d89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-332ec142 elementor-mobile-align-start elementor-tablet-align-start elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"332ec142\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wcsu.edu\/sgics\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">SCHOOL OF Graduate, International and Career Studies<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wcsu.edu\/sgics\/workforce-education-and-lifelong-learning\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Workforce Education and LifeLong Learning<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wcsu.edu\/sgics\/workforce-education-and-lifelong-learning\/applied-generative-ai-certificate\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Applied Generative AI Certificate<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5acd9038 elementor-mobile-align-start elementor-tablet-align-start elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5acd9038\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wcsu.edu\/sgics\/workforce-education-and-lifelong-learning\/fundamentals-of-medical-interpreting-certificate\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fundamentals of Medical Interpreting Certificate<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34048998 e-con-full e-flex e-con e-child\" data-id=\"34048998\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-25f08219 e-con-full e-flex e-con e-child\" data-id=\"25f08219\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-gbadge=\"{&quot;text&quot;:&quot;Hybrid Learning Model&quot;,&quot;hideIfEmpty&quot;:false,&quot;icon&quot;:false}\" class=\"elementor-element elementor-element-106a4119 elementor-hidden-tablet elementor-hidden-mobile premium-gbadge-yes premium-gbadge-flag premium-gbadge-left elementor-widget elementor-widget-image\" data-id=\"106a4119\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"300\" src=\"https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/JLA-class.jpg\" class=\"attachment-full size-full wp-image-860\" alt=\"\" srcset=\"https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/JLA-class.jpg 500w, https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/JLA-class-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20fecc13 elementor-widget elementor-widget-heading\" data-id=\"20fecc13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><b>Time Commitment:<\/b> <br>Flexible scheduling with evening in-person sessions and online learning modules.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32fe2911 e-con-full e-flex e-con e-child\" data-id=\"32fe2911\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-420ac0ec e-con-full e-flex e-con e-child\" data-id=\"420ac0ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6451e5b7 e-con-full e-flex e-con e-child\" data-id=\"6451e5b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7cb901df e-con-full e-flex e-con e-child\" data-id=\"7cb901df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c66b6e8 elementor-widget elementor-widget-image\" data-id=\"5c66b6e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"333\" height=\"279\" src=\"https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/Shahab-e1732303290406.jpg\" class=\"attachment-large size-large wp-image-863\" alt=\"\" srcset=\"https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/Shahab-e1732303290406.jpg 333w, https:\/\/www.wcsu.edu\/sgics\/wp-content\/uploads\/sites\/256\/2024\/12\/Shahab-e1732303290406-300x251.jpg 300w\" sizes=\"(max-width: 333px) 100vw, 333px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bc8293d e-con-full e-flex e-con e-child\" data-id=\"6bc8293d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74c02e66 elementor-widget elementor-widget-heading\" data-id=\"74c02e66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dr. Shahab S. Band<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-102a74de elementor-widget elementor-widget-text-editor\" data-id=\"102a74de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"text-decoration: underline\">Instructor<\/span><br \/><\/strong>email: <a href=\"mailto:bands@wcsu.edu\"><span class=\"s1\">bands@wcsu.edu<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e44ff87 e-flex e-con-boxed e-con e-parent\" data-id=\"1e44ff87\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-62e9a699 e-con-full e-flex e-con e-child\" data-id=\"62e9a699\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55013299 elementor-widget elementor-widget-text-editor\" data-id=\"55013299\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><span style=\"text-decoration: underline\"><span style=\"color: #002856;text-decoration: underline\"><strong>Certificate Modules<\/strong>\u00a0<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bdd9d65 e-con-full e-flex e-con e-child\" data-id=\"2bdd9d65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f59a81e premium-table-dir-ltr elementor-widget elementor-widget-premium-tables-addon\" data-id=\"4f59a81e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_table_responsive&quot;:&quot;yes&quot;}\" data-widget_type=\"premium-tables-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-table-wrap premium-table-responsive\">\r\n\t\t\t\r\n\t\t\t<table class=\"premium-table\" data-settings=\"{&quot;sort&quot;:false,&quot;usNumbers&quot;:false,&quot;sortMob&quot;:false,&quot;search&quot;:false,&quot;records&quot;:false,&quot;dataType&quot;:&quot;custom&quot;,&quot;csvFile&quot;:null,&quot;firstRow&quot;:null,&quot;separator&quot;:null,&quot;pagination&quot;:&quot;&quot;,&quot;rows&quot;:0}\" >\r\n\r\n\t\t\t\r\n\t\t<thead class=\"premium-table-head\">\r\n\r\n\t\t\t<tr class=\"premium-table-row\">\r\n\r\n\t\t\t\t<th class=\"premium-table-cell elementor-repeater-item-023f0cc\"><span class=\"premium-table-text\">#<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-3d69219\"><span class=\"premium-table-text\">Date<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-41181cf\"><span class=\"premium-table-text\">Time<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-5b43e43\"><span class=\"premium-table-text\">Delivery<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-5217804\"><span class=\"premium-table-text\">Module\/Activities<\/span><\/th>\r\n\t\t\t<\/tr>\r\n\r\n\t\t<\/thead>\r\n\r\n\t\t\t\t<tbody class=\"premium-table-body\">\r\n\t\t\t\t\t\t<tr class=\"premium-table-row elementor-repeater-item-a35355b\"><td class=\"premium-table-cell elementor-repeater-item-17acf9e\"><span class=\"premium-table-text\">1<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-621af5a\"><span class=\"premium-table-text\">01\/07\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-cdae8b7\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-24198d5\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-d244136\"><span class=\"premium-table-text\">M1: Foundations of Cybersecurity<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-29818b0\"><td class=\"premium-table-cell elementor-repeater-item-b2e6c4a\"><span class=\"premium-table-text\">2<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-28b674c\"><span class=\"premium-table-text\">01\/08\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-804f051\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-028c5a0\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-06cfaa1\"><span class=\"premium-table-text\">M2: Understanding Cyber Threats and Social Engineering<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-69e75ee\"><td class=\"premium-table-cell elementor-repeater-item-2662468\"><span class=\"premium-table-text\">3<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-6cb101e\"><span class=\"premium-table-text\">01\/14\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-2fb263e\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-3073fa7\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-e84b3b2\"><span class=\"premium-table-text\">M3: Cybersecurity Frameworks and Risk Management<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-24e9fcf\"><td class=\"premium-table-cell elementor-repeater-item-28871ed\"><span class=\"premium-table-text\">4<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-f03c01f\"><span class=\"premium-table-text\">01\/15\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-1a61098\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-ef61160\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-44a61b6\"><span class=\"premium-table-text\">M4: Security Controls and Compliance<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-a205e81\"><td class=\"premium-table-cell elementor-repeater-item-3decb1b\"><span class=\"premium-table-text\">5<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-ed0456e\"><span class=\"premium-table-text\">01\/21\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-3ac8b3d\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-9251928\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-bc3caa2\"><span class=\"premium-table-text\">M5: Incident Detection and Response<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-8a06574\"><td class=\"premium-table-cell elementor-repeater-item-56ee9cc\"><span class=\"premium-table-text\">6<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-c02f0e3\"><span class=\"premium-table-text\">01\/22\/25<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-1e40431\"><span class=\"premium-table-text\">5 - 7 p.m.<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-46fb9d3\"><span class=\"premium-table-text\">In-person<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-f81f3f4\"><span class=\"premium-table-text\">M6: Ethical and Emerging Topics in Cybersecurity<\/span><\/td>\t\t\t<\/tr>\r\n\t\t<\/tbody>\r\n\r\n\t\t\r\n\t\t\t<\/table>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-678587a2 e-con-full e-flex e-con e-child\" data-id=\"678587a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a40c81e elementor-widget elementor-widget-text-editor\" data-id=\"2a40c81e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><span style=\"text-decoration: underline\"><span style=\"color: #002856\"><strong>Detailed Outline<\/strong><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b60a90c e-con-full e-flex e-con e-child\" data-id=\"7b60a90c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cbbf3b7 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"3cbbf3b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"1018950583\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-10189505831\" data-tab-title-id=\"e-n-tab-title-10189505831\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-10189505831\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM1\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-10189505832\" data-tab-title-id=\"e-n-tab-title-10189505832\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-10189505832\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM2\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-10189505833\" data-tab-title-id=\"e-n-tab-title-10189505833\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-10189505833\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM3\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-10189505834\" data-tab-title-id=\"e-n-tab-title-10189505834\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-10189505834\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM4\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-10189505835\" data-tab-title-id=\"e-n-tab-title-10189505835\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-10189505835\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM5\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-10189505836\" data-tab-title-id=\"e-n-tab-title-10189505836\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-10189505836\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tM6\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-10189505831\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-10189505831\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-2fa9a18a e-con-full e-flex e-con e-child\" data-id=\"2fa9a18a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3fe69984 e-flex e-con-boxed e-con e-child\" data-id=\"3fe69984\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-555846c4 elementor-widget elementor-widget-heading\" data-id=\"555846c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M1: Foundations of Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d5670cd elementor-widget elementor-widget-text-editor\" data-id=\"6d5670cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Introduction<\/strong><ul><li>Definition of cybersecurity and its importance in organizations.<\/li><li>Role of cybersecurity professionals.<\/li><li>Overview of the cybersecurity job market and career paths.<\/li><\/ul><\/li><li><strong>Historical Context<\/strong><ul><li>Evolution of cybersecurity threats (e.g., Brain Virus, Morris Worm).<\/li><li>Development of Computer Emergency Response Teams (CERTs).<\/li><\/ul><\/li><li><strong>Key Concepts<\/strong><ul><li>Threats, vulnerabilities, and risks.<\/li><li>CIA Triad: Confidentiality, Integrity, Availability.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-10189505832\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-10189505832\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-13d54376 e-con-full e-flex e-con e-child\" data-id=\"13d54376\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-77bd0cc e-flex e-con-boxed e-con e-child\" data-id=\"77bd0cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-177cb639 elementor-widget elementor-widget-heading\" data-id=\"177cb639\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M2: Understanding Cyber Threats and Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-243d9e95 elementor-widget elementor-widget-text-editor\" data-id=\"243d9e95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Types of Threats<\/strong><ul><li>Internal vs. External threats.<\/li><li>Malware (viruses, worms, ransomware, spyware).<\/li><\/ul><\/li><li><strong>Social Engineering<\/strong><ul><li>Tactics (phishing, vishing, smishing, baiting, physical impersonation).<\/li><li>Why social engineering is effective (authority, urgency, familiarity).<\/li><li>Case studies: LoveLetter attack, Equifax breach.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-10189505833\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-10189505833\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-3f8e01e e-con-full e-flex e-con e-child\" data-id=\"3f8e01e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b98957d e-flex e-con-boxed e-con e-child\" data-id=\"b98957d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78acd9cc elementor-widget elementor-widget-heading\" data-id=\"78acd9cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M3: Cybersecurity Frameworks and Risk Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6577ed44 elementor-widget elementor-widget-text-editor\" data-id=\"6577ed44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Security Frameworks<\/strong><ul><li>Overview: NIST Cybersecurity Framework (CSF), GDPR, ISO standards.<\/li><li>Core components: Goals, guidelines, processes, monitoring.<\/li><\/ul><\/li><li><strong>Risk Management<\/strong><ul><li>Identifying critical assets and risks.<\/li><li>Applying controls to mitigate risks.<\/li><li>Real-world examples of framework implementation.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-10189505834\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-10189505834\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-36a46698 e-flex e-con-boxed e-con e-child\" data-id=\"36a46698\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-33f9b5f1 e-con-full e-flex e-con e-child\" data-id=\"33f9b5f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f5faeca elementor-widget elementor-widget-heading\" data-id=\"1f5faeca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M4: Security Controls and Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ab7e780 elementor-widget elementor-widget-text-editor\" data-id=\"6ab7e780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Security Controls<\/strong><ul><li>Access controls, firewalls, intrusion detection\/prevention systems.<\/li><li>Security tools and techniques (Wireshark).<\/li><\/ul><\/li><li><strong>Compliance and Regulations<\/strong><ul><li>Overview of key regulations: HIPAA, PCI DSS, GDPR.<\/li><li>U.S.-specific regulations: FERC-NERC, FedRAMP.<\/li><li>Consequences of non-compliance.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-10189505835\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-10189505835\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-6f51145 e-flex e-con-boxed e-con e-child\" data-id=\"6f51145\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-21897310 e-con-full e-flex e-con e-child\" data-id=\"21897310\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68a75d3e elementor-widget elementor-widget-heading\" data-id=\"68a75d3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M5: Incident Detection and Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10388338 elementor-widget elementor-widget-text-editor\" data-id=\"10388338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Incident Management<\/strong><ul><li>Phases: Detection, containment, investigation, recovery.<\/li><li>Role of the security analyst during breaches.<\/li><\/ul><\/li><li><strong>Tools and Techniques<\/strong><ul><li>Network activity monitoring, SIEM tools.<\/li><li>Case study: Managing data breaches.<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-10189505836\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-10189505836\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-57cedfb8 e-flex e-con-boxed e-con e-child\" data-id=\"57cedfb8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6390e8a e-con-full e-flex e-con e-child\" data-id=\"6390e8a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39182085 elementor-widget elementor-widget-heading\" data-id=\"39182085\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">M6: Ethical and Emerging Topics in Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5da8eef0 elementor-widget elementor-widget-text-editor\" data-id=\"5da8eef0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Ethical Considerations<\/strong><ul><li>Confidentiality, privacy, and ethical decision-making.<\/li><li>Avoiding conflicts of interest.<\/li><\/ul><\/li><li><strong>Emerging Trends<\/strong><ul><li>Cloud security, blockchain, AI in cybersecurity.<\/li><li>Preparing for future roles: Certifications and skill-building (e.g., Python automation).<\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ee7cbca e-flex e-con-boxed e-con e-parent\" data-id=\"2ee7cbca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-50f69baf e-con-full e-flex e-con e-child\" data-id=\"50f69baf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4270bedf e-con-full e-flex e-con e-child\" data-id=\"4270bedf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77857600 elementor-widget elementor-widget-text-editor\" data-id=\"77857600\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #002856\">Certificate Learning Outcomes<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-754e5e14 elementor-widget elementor-widget-text-editor\" data-id=\"754e5e14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upon successful completion of the Foundation of Cybersecurity Certificate, learners will be able to:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64e72e38 e-con-full e-flex e-con e-child\" data-id=\"64e72e38\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-598976c3 e-con-full e-flex e-con e-child\" data-id=\"598976c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-108e4ff1 elementor-widget elementor-widget-text-editor\" data-id=\"108e4ff1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Define and explain fundamental cybersecurity concepts, including the definitions of cybersecurity, threats, vulnerabilities, and the CIA Triad (Confidentiality, Integrity, Availability).<\/li><li>Analyze historical and modern cybersecurity threats, understanding the evolution of attacks and the importance of Computer Emergency Response Teams (CERTs).<\/li><li>Identify and assess various cyber threats, including internal vs. external threats and common malware types (viruses, ransomware, etc.).<\/li><li>Explain social engineering tactics, why they are effective, and how they impact organizational security, referencing case studies like the LoveLetter attack and the Equifax breach.<\/li><li>Interpret and implement security frameworks and risk management strategies, such as the NIST Cybersecurity Framework, GDPR, and ISO standards, to mitigate risks in real-world scenarios.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60e2d95e e-con-full e-flex e-con e-child\" data-id=\"60e2d95e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5235fd5b elementor-widget elementor-widget-text-editor\" data-id=\"5235fd5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Apply security controls and use cybersecurity tools, including access controls, firewalls, and Wireshark, to detect and prevent cyber threats.<\/li><li>Understand compliance and regulatory requirements, including key U.S. and international regulations like HIPAA, PCI DSS, FERC-NERC, and GDPR, and their impact on organizational security practices.<\/li><li>Manage cybersecurity incidents, following the phases of detection, containment, investigation, and recovery, and using relevant tools like SIEM systems for data breach management.<\/li><li>Discuss ethical considerations in cybersecurity, focusing on confidentiality, privacy, and avoiding conflicts of interest in decision-making.<\/li><li>Analyze and adapt to emerging trends in cybersecurity, such as AI, blockchain, and cloud security, while identifying skills and certifications needed for future roles in the field.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ce69d99 e-flex e-con-boxed e-con e-parent\" data-id=\"5ce69d99\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-58d06a92 e-con-full e-flex e-con e-child\" data-id=\"58d06a92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1aef7f88 elementor-widget elementor-widget-text-editor\" data-id=\"1aef7f88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff\"><strong>Assessment Plan<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fcf2084 elementor-widget elementor-widget-text-editor\" data-id=\"5fcf2084\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff\">The following assessment instruments will be used to evaluate the participants&#8217; learning outcomes and overall understanding of the Foundation of Cybersecurity concepts.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fae7662 e-con-full e-flex e-con e-child\" data-id=\"6fae7662\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-65191bc9 e-con-full e-flex e-con e-child\" data-id=\"65191bc9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e0cef7e elementor-widget elementor-widget-heading\" data-id=\"4e0cef7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Mid-Program Assessment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98bb0c8 elementor-widget elementor-widget-text-editor\" data-id=\"98bb0c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff\">This assessment will be conducted after the completion of Module 4 to gauge participants&#8217; progress and understanding of the first half of the program.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e6e0b95 e-con-full e-flex e-con e-child\" data-id=\"2e6e0b95\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-507c666e elementor-widget elementor-widget-heading\" data-id=\"507c666e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"> 2. Final Assessment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64833e74 elementor-widget elementor-widget-text-editor\" data-id=\"64833e74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff\">This comprehensive assessment will be conducted at the end of the program.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ca2b1a0 e-con-full e-flex e-con e-child\" data-id=\"4ca2b1a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a194c9a elementor-widget elementor-widget-heading\" data-id=\"3a194c9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Participation and Engagement <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef2ec9f elementor-widget elementor-widget-text-editor\" data-id=\"ef2ec9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff\">Assess participants&#8217; overall engagement throughout the program including attendance for in-person modules and participation in online discussions and activities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Foundations of Cybersecurity Certificate Program TBA SCHOOL OF Graduate, International and Career Studies Enhance your Cybersecurity Skills for Today&#8217;s Digital Landscape Program Overview This Foundation of Cybersecurity course provides participants with a comprehensive introduction to the fundamentals of cybersecurity. Topics &hellip;<\/p>\n","protected":false},"author":132,"featured_media":0,"parent":1152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-wcsu.php","meta":{"footnotes":""},"class_list":["post-903","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/pages\/903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/users\/132"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/comments?post=903"}],"version-history":[{"count":0,"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/pages\/903\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/pages\/1152"}],"wp:attachment":[{"href":"https:\/\/www.wcsu.edu\/sgics\/wp-json\/wp\/v2\/media?parent=903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}