Tallinn University of Technology

Aim of the course:

The course covers three domains of cybersecurity.
*The first domain, Endpoint Security, introduces critical foundational concepts in cybersecurity, such as common attacks and attackers; threats, vulnerabilities, and risks; current trends in cybersecurity; network protocol and service vulnerabilities, Windows and Linux endpoints; and threat mitigation and defense.
*The second domain, Network Defense, introduces critical foundational concepts in cybersecurity, such as system and network defense, access control, firewalls, cloud security, applications of cryptography, network security data, and evaluating security alerts.
*The third domain, Cyber Threat Management, introduces critical foundational concepts in cybersecurity, such as ethics and governance, network security testing, threat intelligence, endpoint vulnerability assessment, risk management, and post-incident response.

Target group:

Cybersecurity Essentials is designed for learners who want to start their cybersecurity career journey. This course prepares students to take their first stepping stone toward entry-level or continuing their education toward associate and professional level job roles.

Prerequisites:

Learners are expected to have the following skills:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Foundational understanding of networking and network device configuration.

Topics:

1 Cybersecurity Threats, Vulnerabilities, and Attacks
2 Securing Networks
3 Attacking the Foundation
4 Attacking What We Do
5 Wireless Network Communication Devices
6 Network Security Infrastructure
7 The Windows Operating System
8 Linux Overview
9 System and Endpoint Protection
10 Cybersecurity Principles, Practices, and Processes
11 Understanding Defense
12 System and Network Defense
13 Access Control
14 Access Control Lists
15 Firewall Technologies
16 Zone-Based Policy Firewalls
17 Cloud Security
18 Cryptography
19 Technologies and Protocols
20 Network Security Data
21 Evaluating Alerts
22 Governance and Compliance
23 Network Security Testing
24 Threat Intelligence
25 Endpoint Vulnerability Assessment
26 Risk Management and Security Controls
27 Digital Forensics and Incident Analysis and Response

Study results:

Troubleshoot a wireless network.
Use cybersecurity best practices to improve confidentiality, integrity, and availability.
Configure local and server-based access control.
Implement access control lists (ACLs) to filter traffic and mitigate network attacks.
Determine the cryptographic techniques that are required to ensure confidentiality, integrity, and authenticity.
Use tools for network security testing.
Evaluate threat intelligence sources.
Use incident response models and forensic techniques to investigate security incidents.

Assessment criteria:

51% from Final Test

Graduation document:

TalTech certificate

Language:

Estonian, English

Lecturer:

Mohammad Tariq Meeran

Credits:

contact study: 48 academic hours
autonomous/other study: 30 academic hours

EAP:

3

Contact:

Marika Tamm, marika.tamm@taltech.ee

Price:

2000 € + VAT/participant

Registration deadline:

09.03.2026 23:59

Comment:

Koolitus toimub CISCO Webex Meetings keskkonnas. Vahetult enne kursuse algust jagatakse infot, kuidas keskkonda pääseda ja õige kursus leida.

Location:

webinars@Mondays 17:00-20:00 CISCO Webex Meetings keskkonnas

Timetable:

Location:

webinars@Mondays 17:00-20:00 CISCO Webex Meetings keskkonnas

Price:

2000 € + VAT/participant

Credits:

contact study:
48 academic hours
autonomous/other study:
30 academic hours

EAP:

3

Curriculum group:

Database and network design and administration

Contact:

Marika Tamm, marika.tamm@taltech.ee