Careers360 Logo
Interested in this College?
Get updates on Eligibility, Admission, Placements Fees Structure
Compare

Quick Facts

Medium Of InstructionsMode Of LearningMode Of Delivery
EnglishSelf Study, Virtual ClassroomVideo and Text Based

Course Overview

The modern digital era has revolutionized the way companies conduct business. But this has also created many security risks to the companies and the customers. Cybersecurity is a real threat to the world, there is a need for professionals with the cybersecurity skills to tackle online security threats associated with industries. The Fundamentals of Cybersecurity online course explores key elements of cybersecurity from both International and South African perspectives.

The Fundamentals of Cybersecurity training teaches to defend sensitive data of a company and support the organisation in case of any thwarting cyberattacks and respond to them accordingly. The program develops the ability to create a stable network model and an appropriate incident management strategy for a company.

The Fundamentals of Cybersecurity syllabus develops a basic understanding of cybersecurity management concepts as well as the appropriate environment. The course provides an opportunity to assess Cyber-threats and examine company Information technology practices.

The Highlights

  • Shareable certificate
  • Self-paced learning
  • 7-10 hours per week
  • Online learning
  • Assessments and projects
  • University of Cape Town offering
  • Downloadable resources
  • Course provider Getsmarter
  • 8 weeks duration
  • Split fee option available

Programme Offerings

  • video lectures
  • quizzes
  • online learning
  • Live polls
  • Case Studies
  • Infographics
  • Self-paced learning
  • Offline resources

Courses and Certificate Fees

Certificate AvailabilityCertificate Providing Authority
yesUCT Cape Town

The Fundamentals of Cybersecurity fees is Rs. 71,837.  Learners can either pay the whole fee at one time or decide to pay the total fee amount in 2 installments. An additional admin charge will be added if the candidate opts for the installment option.

Fee type

Fee amount in INR

Fundamentals of Cybersecurity fees

Rs. 71,837


Eligibility Criteria

Certification Qualifying Details

To get Fundamentals of Cybersecurity certification by GetSmarter, candidates must complete practicals, live polls, quizzes, assignments and finish all modules of the course. Candidates must meet all of the standards specified in the course handbook in order to qualify for the certification.

What you will learn

Knowledge of Cyber Security

After completing the Fundamentals of Cybersecurity online training, candidates will learn about Risk management and basic concepts of cybersecurity management. Candidates will gain knowledge of different hardware, software, and techniques used in Fundamentals of Cybersecurity. Candidates will also learn about the Management of incidents.


Who it is for

  • Executives or managers who want to understand the importance of cybersecurity and its function within an organisation.
  • IT professionals like Software developers who want to expand their knowledge in cybersecurity to manage a company’s information system.
  • Senior managers who want to gain knowledge of cybersecurity threats and various security measures to stop the threat.

Admission Details

To get admission in the Fundamentals of Cybersecurity course for beginners by UCT, candidates must complete the following steps:

  • Visit the course's official website.
  • To initiate registration, go to the course page and click the 'Register Now' button.
  • Checkmark the consent box to confirm that you have read and agree to the terms and conditions before proceeding.
  • Create an account on the Getsmarter website by filling in personal details.
  • Submit the billing address details and mention the sponsor details if applicable.
  • Start the course on the scheduled date by paying the fee with a credit/debit card or bank transfer.

The Syllabus

  • Review the importance of cybersecurity management within organisations
  • Discuss the evolution and current state of cybersecurity
  • Identify the roles and processes in maintaining effective Fundamentals of Cybersecurity practices in an organisation

  • Articulate the different types of cybersecurity threats that face organisations today
  • Outline the major cyber threat actors
  • Investigate how an organisation can secure itself against cyberattacks through understanding the value and vulnerabilities of its information assets
  • Evaluate the risks facing an organisation
  • Compare the methods for assessing the cybersecurity risks in an organisation

  • Discuss the important elements of the Electronic Communications and Transactions Act
  • Outline the main sections in the South African National Cybersecurity Policy Framework (NCPF)
  • Articulate the role of the POPI Act as a guide to secure customer information in a business
  • Differentiate between the different cybersecurity policy models
  • Analyse the role of corporate governance in cybersecurity management

  • Compare the types of social engineering and human exploits
  • Illustrate the impact of social engineering and human weakness on cybersecurity within an organisation
  • Develop company-wide communication to support Fundamentals of Cybersecurity education, training, and awareness within an organisation
  • Justify the importance of building a cybersecurity culture

  • Relate the goals of network security to the goals of information assurance
  • Identify the primary network security principles and methods
  • Apply the concepts of secure network design
  • Design a secure network for a given organisation
  • Investigate the core principles of a defense-in-depth strategy

  • Compare the types of hardware and software used to protect an organisation's data
  • Relate the use of data protection strategies, including access control and cryptography, to information assurance
  • Evaluate a software or hardware product for securing a specific network

  • Differentiate between the NIST cybersecurity model and the 20 critical controls model
  • Identify the function and purpose of the CIS 20 Critical Security Controls (CSCs)
  • Discuss the opportunities and challenges in collaborating to develop Fundamentals of Cybersecurity best practices
  • Relate the importance and implementation of CIS Critical Security Controls (CSCs) 11 to 20
  • Review the importance and implementation of CIS Critical Security Controls (CSCs) one to 10
  • Compile a prioritised Critical Security Controls (CSCs) implementation plan
  • Justify the role of the CIS 20 Critical Security Controls (CSCs) in cybersecurity governance

  • Investigate planning, developing, and maintaining an incident response capacity for an organisation
  • Articulate the need for an incident response capacity in terms of cybersecurity
  • Develop key sections of an incident response policy for a given organisation
  • Recommend an incident response policy for a given organisation

Instructors

UCT Cape Town Frequently Asked Questions (FAQ's)

1: What is meant by Fundamentals of Cybersecurity?

 Fundamentals of Cybersecurity is a set of procedures, activities, and technological practices aimed at preventing attacks, disruption, and unwanted access to networks, computers, and records.

2: Is Cybersecurity a good career?

A career in cybersecurity is highly satisfying and rewarding.

3: What are the common types of cyber threats?

SQL injection, DNS tunnelling, Phishing, and denial-of-service attacks are the common types of cyber threats.

4: Can I get into an Online Fundamental of Cybersecurity course with no experience?

Yes, candidates gain Fundamentals of Cybersecurity from the course provided by UCT with no experience and get into the cybersecurity field.

5: Which is the best Cybersecurity course for beginners?

The Fundamentals of Cybersecurity provided by UCT is the best cybersecurity course for beginners.

Back to top