Cybersecurity Program (Based on ISACA ITCA and Microsoft SC-900 Materials)

A participant who has completed the training:

  • understands IT security methodology and management at a basic level;
  • knows cybersecurity threats, can associate them with organizational assets, and apply defence measures to mitigate risks;
  • performs security monitoring within the IT infrastructure, identifies anomalies, and applies threat intelligence;
  • is capable of adequately responding to security incidents;
  • knows Microsoft security technologies and can select appropriate security components for their organization or company.

The goal of this retraining program is to provide participants with beginner-level knowledge and practical skills on how to implement cybersecurity controls within an organization. Graduates will gain the vocational foundations needed to start a career as a Cybersecurity Specialist.

The four-month training program includes both independent study and online seminars led by an instructor.

The curriculum is based on the Lifelong learning standard and industry best practices (ISACA ITCA and Microsoft SC-900 materials).

Upon successful completion of the course, participants will receive a certificate from BCS Koolitus, as well as a certificate from the international e-learning platform CBT Nuggets, and the opportunity to take an internationally recognized Microsoft certification exam. 

The training program consists of three integrated modules:

  1. ISACA ITCA: Cybersecurity Fundamentals Online Training
  2. Course SC-900T00-A: Microsoft Security, Compliance, and Identity Fundamentals (Microsoft Learn)
  3. An independent project: development of a “Company Cybersecurity Architecture Plan”.

The first two modules consist of independent e-learning, supported by weekly online webinars led by an expert. The training concludes with the completion and presentation of the independent project.

Target audience and prior knowledge (Prerequisites):
The course is intended for Individuals who wish to launch a career as a cybersecurity specialist or enhance their existing competence in protecting an organization’s IT infrastructure against cyber threats. It is suitable for those who:

  • have basic computer literacy and ability to use common software applications (test your digital skills Digital Skills Assessment Tool);
  • have at least B2 level in English;
  • have time to commit to a 4- month course;
  • have serious interest in the field of Cybersecurity.

Teaching aids: Participants need a computer (Windows, macOS or Linux) with web camera and microphone;  permission to install and configure applications, as well as an up-to-date web browser.

Program:
Modul 1 – ISACA ITCA: Cybersecurity Fundamentals
(84 academic hours independent study and 19 academic hours mentor meetings)

Week 1
20.02.26 15:15-16:00 (Eastern European Time)
1. Webinar with the mentor – Introduction of the program (1 academic hours)

Week 2
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Defining Security and its Roles
  • Roles, Governance, Continuity, and Recovery
  • CIA, Least Privilege, and Privacy
  • Threat Landscape

06.03.26 15:15-16:45 (Eastern European Time)
2. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Week 3
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Motivations, Agents, and the Attack Sequence
  • Malware and its Symptoms

13.03.26 15:15-16:45 (Eastern European Time)
3. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Week 4
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Common Attack Methods Part 1
  • Common Attack Methods Part 2
  • Risk Management
  • Regulatory Requirements, The Modern Perimeter

20.03.26 15:15-16:45 (Eastern European Time)
4. Webinar with the mentor –  weekly summary and introduction to the next topic (2 academic hours)

Week 5
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Network Security Controls
  • Understand Firewall Functions
  • Endpoint Firewalls and Windows Firewall

27.03.26 15:15-16:45 (Eastern European Time)
5. Webinar with the mentor –  weekly summary and introduction to the next topic (2 academic hours)

Week 6
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Mac/Linux Firewalls and IDS/IPS
  • AAA Controls
  • Cloud Services
  • Cloud Security and Models

02.04.26 15:15-16:45 (Eastern European Time)
6. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Week 7
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Data Security
  • Symmetric Encryption
  • Asymmetric Encryption, Hashing, Digital Signatures

10.04.26 15:15-16:45 (Eastern European Time)
7. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Week 8
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • PKI and Applying Cryptography
  • Security Operations and Vulnerability Management
  • Penetration Testing and EDR

24.04.26 15:15-16:45 (Eastern European Time)
8. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Week 9
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Incident Response and Digital Forensics
  • Network Command-Line Tools
  • Penetration Testing Tools

30.04.26 15:15-16:45 (Eastern European Time)
9. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Week 10
E-learning and independent study
ISACA ITCA: Cybersecurity Fundamentals Online Training

  • Concluding Tools and Techniques

08.05.26 15:15-16:45 (Eastern European Time)
10. Webinar with the mentor – weekly summary and introduction to the next topic (2 academic hours)

Modul 2 – Microsoft SC-900 Microsoft Security, Compliance, and Identity Fundamentals
(10 academic hours independent study and 2 academic hours mentor meetings)

Week 11
E-learning and independent study
Microsoft SC-900 Microsoft Security, Compliance, and Identity Fundamentals

  • Introduction to security, compliance, and identity concepts
  • Introduction to Microsoft Entra
  • Introduction to Microsoft security solutions
  • Introduction to Microsoft Priva and Microsoft Purview

15.05.26 15:15-16:45 (Eastern European Time)
11. Webinar with the mentor (2 academic hours)

  • summary of the course Microsoft SC-900
  • introduction to the Graduation project work

Modul 3 – Graduation Project
(40 academic hours independent study and 9 academic hours mentor meetings)

Cybersecurity Architecture Plan
The project involves developing a cybersecurity architecture plan for a company with a predefined IT infrastructure. This includes assessing the organisation’s current cybersecurity status, identifying key risks, and preparing an annual action plan for cybersecurity measures. Participants will design an economically viable security architecture for a sample company, including the technological components and a description of their functionality and interoperability.
If desired, participants may choose their own organisation or another real, existing company as the basis for the project.

Week 12
Independent study – Graduation project

22.05.26 15:15-16:45 (Eastern European Time)
12. Webinar with the mentor – Graduation project preview and consultations (2 academic hours)

Week 13
Independent study – Graduation project

29.05.26 15:15-16:45 (Eastern European Time)
13. Webinar with the mentor – Graduation project preview and consultations (2 academic hours)

Week 14
Independent study – Graduation project

05.06.26 15:15-16:45 (Eastern European Time)
14. Webinar with the mentor – Graduation project preview and consultations (2 academic hours)

Week 15
Independent study – Graduation project

12.06.26 15:15 – 17:30 (Eastern European Time)
15. Webinar with the mentor – (3 academic hours)

  • Graduation project presentation.
    Each group has 10 minutes to present their work to the mentor and co-students.
  • Wrap-up of the course.

Learning methods and volume of the course:
The course is conducted in English.
You can participate in the webinars by joining through the online platform Zoom. Between the online webinars, the main communication platform for interacting with the mentor and fellow students is the course’s learning environment Slack.

The course has three modules.
The total volume of the training is 164 academic hours (within period of 16 weeks) including:

Mentor meetings 30 academic hours.
E-learning and independent study 134 academic hours.
e-learning = learning that takes place partially or completely with the help of digital technological means.

Methods used during the course:

  • E-course lectures
  • E-course video lectures
  • Workshops with mentor
  • Practical exercises
  • Independent project work

Evaluation method:

  • Completion of all mandatory e-learning courses.
  • Participation in at least 75% of the online webinars and workshops.
  • Completion of the final project.

Graduation criteria: Learners who have achieved the learning outcomes and successfully passed the assessment will be awarded a certificate in accordance with the applicable continuing education standard in Estonia.

If a participant fails to meet at least one of the following conditions, they will receive a certificate of participation instead:

  • not completing all mandatory e-learning courses;
  • not attending at least 75% of the workshops;
  • not completing the graduation project.

The price includes:
Access to the e-learning platform CBT Nuggets;
Access to the Microsoft SC-900 official study materials and labs. Also, for the Microsoft SC-900 certification examination (subsequent attempts not included);
Access to the communication channel Slack and other study materials.

See the full curriculum of the program here.

Curriculum group: 0612 Database and Network Design and Administration.

Lecturer’s Linkedin

Tähelepanu! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.

Attention! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.

Внимание! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.