
CONTACT US to learn more about our program for high schools and community colleges!
Cedge Learn offers a wide range of specialized courses in network security and emerging technologies. From essential fundamentals of Network Security to advanced controls and security in mobile devices and IoT, students can explore topics such as Network Security Fundamentals, Identification, Authentication, and Authorization, Network Security Controls (physical, administrative, and technical), as well as Virtualization and Cloud Computing. The courses also cover critical aspects including Wireless Network Security, Mobile Device Security, IoT Device Security Fundamentals, and Cryptography and PKI Fundamentals, preparing participants for contemporary and future challenges in protecting information and digital infrastructure.
This certification track represents your comprehensive understanding of network security fundamentals. It covers essential concepts, technologies, and best practices for securing networks against a wide range of threats. The badge is earned through gamified, hands-on experience with network security tools and techniques, enabling you to implement effective security measures in real-world environments.
CEdge Issues Open Badges
What you will learn
Network Security Principles
This module introduces fundamental security concepts and principles that are essential for understanding and implementing network security measures. It covers topics such as:
- CLICK to preview introduction
- The CIA Triad
- Security Models
- Risk Management
- Vulenrability Assessment
- Threat Modeling
Network Security Threats and Attacks
This module explores common network security threats and attacks, covering their techniques, motives, and impact. It includes topics such as:
- Malware
- Phishing
- Social Engineering
- Denial of Service Attacks
- Advanced Persistent Threats
Security Protocols and Standards
This module covers essential security protocols and standards used for secure communication and data protection. It delves into protocols like TCP/IP, HTTPS, TLS, SSH, VPN, and standards like ISO 27001 and NIST Cybersecurity Framework.
- TCP/IP
- HTTPS
- TLS
- SSH
- VPN
- Standards (Like ISO 27001 and the NIST Cybersecurity Framework)
Firewalls and Intrustion Detection/Prevention Systems
This module explores firewalls and intrusion detection/prevention systems (IDS/IPS) as key components of network security. It covers:
- Their functionality
- Their types
- Configuration
- Deployment Strategies
Cryptography and Secure Communications Module
This module covers fundamental cryptography concepts, algorithms, and applications in network security. It includes topics such as:
- Encryption
- Hashing
- Digital Signatures
- Key Management
Wireless Network Security Module
This module focuses on securing wireless networks, including WLANs and mobile device connectivity. It covers topics such as:
- WPA2/3
- 802.1x authentication
- Mobile device management
Network Segmentation and Security Zones Module
This module discusses the importance of network segmentation and security zones for isolating critical systems and limiting the impact of security breaches. It covers concepts like:
- VLANs
- DMZs
- Security zone configuration
Incident Response and Forensics Module
This module covers incident response methodologies, techniques for incident handling, and digital forensics principles. It includes topics such as incident detection, containment, eradication, and recovery.
- Incident handling
- Digital forensic principles
- Incident Detection
- Containment
- Eradication
- Recovery
Network Security Tools and Technologies Module
his module introduces various network security tools and technologies used for monitoring, analysis, and incident response. It covers tools like:
- Wireshark
- Nmap
- Metasploit
- Instrusion detection systems
Security Auditing and Compliance Module
This module focuses on network security auditing, compliance frameworks, and best practices for ensuring ongoing security posture. It covers topics like penetration testing, vulnerability assessments, and compliance with standards like PCI DSS and HIPAA.
- Penetration testing
- Vulnerability assessments
- Compliance with standards like PCI, DSS and HIPAA