SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Certificate of Completion
Jan 5, 2017
Date
For completing the Cisco Networking Academy® Cybersecurity Essentials course, and demonstrating
the following abilities:
• Describe the tactics, techniques and procedures used by cyber criminals.
• Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity
countermeasures.
• Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high
availability.
• Explain how cybersecurity professionals use technologies, processes and procedures to defend all components
of the network.
• Explain the purpose of laws related to cybersecurity.
Presented to:
Arturo Quiros Arguedas
Name
Harbrinder Kang, Cisco Networking Academy

Contenu connexe

Tendances

Network security
Network securityNetwork security
Network security
snegacmr
 
Cyberdefense in depth with validy technology
Cyberdefense in depth with validy technologyCyberdefense in depth with validy technology
Cyberdefense in depth with validy technology
Gilles Sgro
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Bryan Len
 

Tendances (19)

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information Security
 
Introduction to CSIRTs
Introduction to CSIRTsIntroduction to CSIRTs
Introduction to CSIRTs
 
Cyberdefense in depth with validy technology
Cyberdefense in depth with validy technologyCyberdefense in depth with validy technology
Cyberdefense in depth with validy technology
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Fire walls
Fire wallsFire walls
Fire walls
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Defense in Depth
Defense in DepthDefense in Depth
Defense in Depth
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 

CiscoCertificate Cyber security Essentials

  • 1. Certificate of Completion Jan 5, 2017 Date For completing the Cisco Networking Academy® Cybersecurity Essentials course, and demonstrating the following abilities: • Describe the tactics, techniques and procedures used by cyber criminals. • Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. • Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high availability. • Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network. • Explain the purpose of laws related to cybersecurity. Presented to: Arturo Quiros Arguedas Name Harbrinder Kang, Cisco Networking Academy