Graduate Conversion Program in Cybersecurity

Course Description

This 12-module program is designed to progressively introduce students to the key aspects of cybersecurity, from understanding the basics of digital systems and network protocols to exploring advanced topics like ethical hacking and incident response. Each module includes both lectures and practical exercises, emphasizing real-world applications and developing problem-solving skills. By the end of the program, students will gain foundational cybersecurity knowledge and experience with industry-standard tools and techniques.

The Graduate Conversion Program in Cybersecurity provides an introductory foundation in cybersecurity for students with basic computer knowledge. This program aims to transform beginners into competent cybersecurity professionals by introducing essential concepts, practices and tools to protect digital systems from threats. Covering cybersecurity fundamentals, network security, ethical hacking and data protection, the course balances theory with hands-on tasks, preparing students for entry-level roles in cybersecurity or further studies in the field.

Module 1: Introduction to Cybersecurity

 
  • Overview of cybersecurity, its importance and current trends.
  • Key Topics: Definitions, cyber threats and attack types.
  • Practical Task: Identify common cybersecurity threats.
 
Module 2: Fundamentals of Computer Systems 
  • Understanding basic computer and network operations.
  • Key Topics: Hardware, software, operating systems and file systems.
  • Practical Task: Basic navigation of a computer OS and file management.
 
Module 3: Introduction to Networking 
  • Basics of computer networking for cybersecurity.
  • Key Topics: Types of networks (LAN, WAN), IP addresses, protocols.
  • Practical Task: Set up a basic network connection and verify connectivity.
 
Module 4: Cybersecurity Threats and Vulnerabilities


 
  • Exploration of various cyber threats and system vulnerabilities.
  • Key Topics: Malware, phishing, social engineering.
  • Practical Task: Recognize phishing emails and social engineering tactics.
 
Module 5: Network Security Essentials 
  • Introduction to securing network communications.
  • Key Topics: Firewalls, intrusion detection, secure Wi-Fi settings.
  • Practical Task: Set up a firewall and configure basic network security.
  •  
 
Module 6: Basic Cryptography

 
  • Understanding the role of encryption in protecting data.
  • Key Topics: Encryption basics, symmetric vs. asymmetric encryption.
  • Practical Task: Encrypt and decrypt simple messages.
 
Module 7: Authentication and Access Control 
  • Implementing secure access control measures.
  • Key Topics: Password policies, multi-factor authentication, user permissions.
  • Practical Task: Set up a basic user authentication system.
 
Module 8: Introduction to Ethical Hacking

 
  • Basics of ethical hacking and penetration testing.
  • Key Topics: Ethics in hacking, reconnaissance, basic testing tools.
  • Practical Task: Perform a simple vulnerability scan on a local network.
 
Module 9: Cybersecurity Policies and Compliance

 
  • Understanding security policies, laws, and compliance standards.
  • Key Topics: Privacy laws, compliance frameworks (GDPR, HIPAA).
  • Practical Task: Draft a basic cybersecurity policy for a small organization.
 
Module 10: Incident Response and Recovery

 
  • Basics of responding to and recovering from security incidents.
  • Key Topics: Incident response lifecycle, reporting, recovery plans.
  • Practical Task: Simulate an incident response and document the steps.
 
Module 11: Cybersecurity Tools and Technologies

 
  • Introduction to cybersecurity tools for monitoring and threat detection.
  • Key Topics: Antivirus software, log analysis, SIEM basics.
  • Practical Task: Use a basic antivirus and analyze a simple log file.
 
Module 12: Cybersecurity Careers and Emerging Trends

 
  • Explore cybersecurity career paths and current trends.
  • Key Topics: Cloud security, Internet of Things (IoT) security, AI in cybersecurity.
  • Practical Task: Group discussion on future of cybersecurity and technology impacts.
 
Assessment Methods
 
  • Practical Exercises: Module-based tasks to apply skills learned.
  • Quizzes: Regular quizzes to assess understanding of core concepts.
  • Final Project: A comprehensive project requiring students to create a security plan for a hypothetical organization, utilizing the knowledge gained in the course.
 
    • Graduates from Non-IT Fields: Individuals from any discipline interested in transitioning to a cybersecurity career.
    • Professionals Seeking Career Change: Professionals looking to shift to cybersecurity roles.
    • Beginners in IT and Cybersecurity: Those with minimal IT background who want a structured, beginner-friendly introduction to cybersecurity.

By the end of the course, students will be able to:

  1. Understand cybersecurity fundamentals: Define key cybersecurity terminology and comprehend basic security principles.
  2. Identify security threats: Recognize various types of cyber threats and understand their impacts on systems.
  3. Implement network security basics: Use firewalls and other techniques to secure network connections.
  4. Apply safe browsing practices: Learn and practice measures for secure internet use and protecting personal information.
  5. Explore ethical hacking principles: Understand the fundamentals of ethical hacking and its importance in cybersecurity.
  6. Demonstrate basic encryption methods: Use simple encryption techniques to protect data confidentiality.
  7. Understand authentication and access control: Implement basic authentication techniques to secure access to digital resources.
  8. Explore cybersecurity policies and best practices: Learn about security policies, best practices, and their role in minimizing risks.
  9. Respond to security incidents: Grasp fundamental incident response steps and learn how to report security breaches.
  10. Analyze real-world cybersecurity cases: Review case studies to understand cybersecurity breaches and prevention techniques.
  11. Utilize cybersecurity tools: Work with basic cybersecurity tools used for monitoring and detecting threats.
  12. Develop a cybersecurity mindset: Foster a proactive approach toward maintaining digital security and resilience.

Prerequisites:

  • Basic understanding of computer operations (e.g., file management, internet browsing, basic software usage).
  • Familiarity with using a personal computer, such as Windows or macOS.
The delivery method for this certification is entirely online, requiring candidates to have access to a personal computer.

Simple English and Sinhala

60 Hours
3 Days per week, 2 Hours
Per Participant Fee: Rs 30,000/= 

How to Apply

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.

How To Apply

Your Application

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

Our Response

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Your Journey

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.

FORM

Are you ready to take the next step toward your future career?