{"id":983,"date":"2015-03-16T13:09:00","date_gmt":"2015-03-16T19:09:00","guid":{"rendered":"http:\/\/www.shscomputers.com\/wordpress\/?page_id=983"},"modified":"2019-01-15T14:55:15","modified_gmt":"2019-01-15T21:55:15","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.shscomputers.com\/wordpress\/?page_id=983","title":{"rendered":"CyberSecurity"},"content":{"rendered":"<h2><strong>Introduction to Cybersecurity<\/strong><\/h2>\n<p><a href=\"https:\/\/www.shscomputers.com\/wordpress\/wp-content\/uploads\/Cyber-Security.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-988\" src=\"https:\/\/www.shscomputers.com\/wordpress\/wp-content\/uploads\/Cyber-Security-300x225.jpg\" alt=\"Cyber-Security\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.shscomputers.com\/wordpress\/wp-content\/uploads\/Cyber-Security-300x225.jpg 300w, https:\/\/www.shscomputers.com\/wordpress\/wp-content\/uploads\/Cyber-Security.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>Estimated Time to Complete:<\/strong> 15 hours<br \/>\n<strong>Prerequisites:<\/strong> None, basic understanding of routing and switching concepts preferable<br \/>\n<strong>Course Credits:&nbsp;<\/strong>NET2110,&nbsp;NET2910,&nbsp;NET3100<br \/>\n<strong>Course Overview:<\/strong>&nbsp;<a href=\"https:\/\/www.shscomputers.com\/wordpress\/wp-content\/uploads\/Course-Overview.pdf\">PDF Download<br \/>\n<\/a><\/p>\n<p>The demand for cybersecurity experts has grown three times faster than any other job role in ICT, and training a cybersecurity workforce is a priority of many governments. As we become increasingly reliant on technology and cyberspace to conduct our affairs, we want to safeguard against interruptions in the process.<\/p>\n<p>Introduction to Cybersecurity covers trends in this growing field and demonstrates the need for cybersecurity skills in various industries.<\/p>\n<p>Concepts are presented through activities and videos, with built-in assessments to test your knowledge.<\/p>\n<p>After completing this course, you&#8217;ll be able to:<\/p>\n<ul>\n<li>Explain the global implications of cyber threats<\/li>\n<li>Explain ways that networks may be vulnerable to attacks<\/li>\n<li>Explain the impact of cyberattacks on industries<\/li>\n<li>Explain Cisco\u2019s approach to threat detection and defense<\/li>\n<li>Explain why cybersecurity is a growing profession<\/li>\n<li>Explain the opportunities for pursuing network security certifications<\/li>\n<\/ul>\n<p>We are now in the age of the Internet of Everything! The network is used for everything from storing an organization\u2019s copyrighted data, to storing an individual\u2019s financial and health information. As we get more connected, more data is vulnerable than ever before. There are those who want to take advantage of that vulnerability. We must secure our data.<\/p>\n<p>This course also introduces you to a variety of networking professionals who discuss the exciting and expanding industry of cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity Estimated Time to Complete: 15 hours Prerequisites: None, basic understanding of routing and switching concepts preferable Course Credits:&nbsp;NET2110,&nbsp;NET2910,&nbsp;NET3100 Course Overview:&nbsp;PDF Download The demand for cybersecurity experts has grown three times faster than any other job role in ICT, and training a cybersecurity workforce is a priority of many governments. As we become [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-983","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=983"}],"version-history":[{"count":4,"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/983\/revisions"}],"predecessor-version":[{"id":1449,"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/983\/revisions\/1449"}],"up":[{"embeddable":true,"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/4"}],"wp:attachment":[{"href":"https:\/\/www.shscomputers.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}