
Curriculum for the NCS Entry-Level Certification:
All 84 planned lessons of the NCS curriculum:
Categories:
- Network Security: firewalls, VPNs, protocols, ten lessons
- Threat Analysis: malware, phishing, ransomware, twelve lessons
- Cloud Security: cloud storage, SaaS, IaaS, PaaS, eleven lessons
- Endpoint Security: device protection, antivirus, nine lessons
- Identity & Access Management: authentication, authorization, ten lessons
- Data Security: encryption, backups, compliance, twelve lessons
- Web Security: web app firewalls, secure coding, eleven lessons
- Mobile Security: mobile device management, app security, nine lessons
Platform Features:
- Interactive lessons with videos, animations, and graphics
- Quizzes and exams with instant feedback
- Virtual labs for hands-on practice
- Discussion forums for student interaction
- Progress tracking and certification upon completion
- Mobile optimization for learning on-the-go
- Gamification elements for engagement
**Module 1: Network Security (10 lessons)**
- Introduction to Network Security
- Network Fundamentals: Protocols and Devices
- Firewalls: Types and Configuration
- Virtual Private Networks (VPNs): Setup and Management
- Network Threats: Malware and Vulnerabilities
- Intrusion Detection Systems (IDS): Concepts and Tools
- Network Segmentation: Strategies and Benefits
- Secure Routing: Protocols and Configuration
- Network Security Monitoring: Tools and Techniques
- Incident Response: Network Security Breaches
**Module 2: Threat Analysis (12 lessons)**
- Introduction to Threat Analysis
- Threat Intelligence: Sources and Types
- Malware Analysis: Static and Dynamic Techniques
- Phishing Attacks: Types and Countermeasures
- Ransomware: Evolution and Defense Strategies
- Advanced Persistent Threats (APTs): Characteristics and Detection
- Threat Modeling: Identifying Vulnerabilities
- Risk Management: Assessing and Mitigating Threats
- Incident Response: Threat Analysis and Containment
- Threat Hunting: Proactive Techniques and Tools
- Threat Intelligence Sharing: Benefits and Challenges
- Emerging Threats: Trends and Predictions
**Module 3: Cloud Security (11 lessons)**
- Introduction to Cloud Security
- Cloud Computing Models: IaaS, PaaS, SaaS
- Cloud Security Frameworks: NIST, CSA, ISO
- Cloud Threats: Data Breaches, Unsecured APIs
- Identity and Access Management (IAM) in Cloud
- Cloud Encryption: Data at Rest and in Transit
- Cloud Security Monitoring: Tools and Techniques
- Incident Response: Cloud Security Breaches
- Cloud Compliance: Regulations and Standards
- Cloud Security Architecture: Design Principles
- Emerging Cloud Threats: Trends and Predictions
**Module 4: Endpoint Security (9 lessons)**
- Introduction to Endpoint Security
- Endpoint Threats: Malware, Ransomware, Phishing
- Endpoint Protection Platforms (EPPs): Features and Tools
- Endpoint Detection and Response (EDR): Concepts and Solutions
- Endpoint Encryption: Full Disk, File, and Folder
- Endpoint Security Policies: Configuration and Management
- Incident Response: Endpoint Security Breaches
- Endpoint Security Monitoring: Tools and Techniques
- Emerging Endpoint Threats: Trends and Predictions
**Module 5: Identity & Access Management (10 lessons)**
- Introduction to IAM
- Identity Types: Users, Groups, Roles, Attributes
- Authentication Methods: Passwords, Biometrics, Tokens
- Authorization Models: RBAC, ABAC, MAC
- Identity Governance: Compliance and Audit
- Access Management: Single Sign-On (SSO), Federation
- Identity Threats: Account Takeover, Privilege Escalation
- Incident Response: IAM Security Breaches
- IAM Solutions: Tools and Technologies
- Emerging IAM Trends: Cloud, AI, Blockchain
**Module 6: Data Security (12 lessons)**
- Introduction to Data Security
- Data Types: Structured, Unstructured, Semi-structured
- Data Threats: Breaches, Leaks, Corruption
- Data Encryption: Algorithms, Modes, Best Practices
- Data Masking: Techniques and Tools
- Data Loss Prevention (DLP): Concepts and Solutions
- Incident Response: Data Security Breaches
- Data Security Monitoring: Tools and Techniques
- Data Compliance: Regulations and Standards
- Data Here are the remaining lessons:
- Emerging Data Threats: Trends and Predictions
- Data Security in Cloud: Challenges and Solutions
- Data Security for IoT: Unique Considerations
- Data Security Metrics: Measurement and Reporting
- Data Security Awareness: Training and Education
**Module 7: Web Security (11 lessons)**
- Introduction to Web Security
- Web Threats: OWASP Top 10, Malware, Phishing
- Web Application Firewalls (WAFs): Concepts and Tools
- Secure Coding Practices: Input Validation, Error Handling
- Web Encryption: HTTPS, TLS, SSL
- Web Authentication: Passwords, Tokens, Biometrics
- Web Authorization: Roles, Attributes, Access Control
- Incident Response: Web Security Breaches
- Web Security Monitoring: Tools and Techniques
- Emerging Web Threats: Trends and Predictions
- Web Security Frameworks: OWASP, NIST, ISO
**Module 8: Mobile Security (9 lessons)**
- Introduction to Mobile Security
- Mobile Threats: Malware, Phishing, Data Breaches
- Mobile Device Management (MDM): Concepts and Tools
- Mobile Encryption: Data at Rest and in Transit
- Mobile Security Best Practices: App Vetting, Wi-Fi Safety
Classes are to be held:
Monday: Three-hour online lecture;
Tuesday: Homework;
Wednesday: Homework;
Thursday: Online review and testing.
Classes will be held twice a week online for 40 weeks and students will earn a credential in up to three of the eight categories.
National Cyber School
• Pioneering Entry-Level certification for
individuals without college degree or
experience
• Partnering with local governments and
corporations who will provide scholarships
and recognize NCS credential as a path to
employment
• Providing test prep for all levels of
experience for most coveted credentials
worldwide
• NCS uses AI to customize curriculum for
each student, assessing their acumen in the
various disciplines and directing their
efforts to categories that will display the
highest and best use of their talents

Create Your Own Website With Webador