Introduction to Cybersecurity

The Introduction to Cybersecurity is a lifelong learning program designed for anyone who wants to gain a fundamental understanding of key cybersecurity concepts and the threats that endanger our IT systems. Regardless of your professional or educational background, this program provides an excellent opportunity for all interested individuals to learn how to effectively protect themselves in a digital environment. The acquired knowledge and skills will be useful not only in a professional setting but also in everyday life, as data protection is crucial for all of us.

Why Enroll in This Program?

This program provides fundamental knowledge and skills needed to identify and analyze cybersecurity threats, understand the basics of penetration testing, and grasp the security aspects of network systems.

The program is ideal for:

  • Professionals who want to understand cybersecurity basics relevant to their work (IT, management, finance, HR, legal services)
  • Entrepreneurs and business owners who want to learn how to protect their digital business
  • Students and enthusiasts looking to enter the field of cybersecurity
  • Anyone interested in learning how to safeguard their data and devices in the digital world

To enroll, participants must have at least a secondary school education (level 4.2 according to the Croatian Qualifications Framework).

Program Overview

The Introduction to Cybersecurity program is part of our lifelong learning initiative, aiming to provide people from various professions, age groups, and knowledge levels with opportunities for continuous development and skill acquisition. By ensuring access to quality education in key areas like cybersecurity, RIT Croatia seeks to support the growth and development of individuals who want to enhance their competencies and prepare for future challenges.

  • Duration: 30 hours (10 hours of instruction + 20 hours of independent study)
  • Mode of delivery: In-person
  • Language: Croatian
  • Location: Zagreb campus of RIT Croatia
  • Completion requirements: Minimum 60% attendance and successful completion of a written exam
  • Number of participants: 25

Program Schedule

The classes will be held at the Zagreb campus on the following dates:

  • Monday, March 17, 2025, from 5:30 pm to 8:00 pm
  • Wednesday, March 19, 2025, from 5:30 pm to 8:00 pm
  • Thursday, March 20, 2025, from 5:30 pm to 8:00 pm
  • Monday, March 24, 2025, from 5:30 pm to 8:00 pm – on the final day of the program, participants will present the project they have been working on and take the written exam.

Learning Outcomes

Upon completion of the program, participants will be able to:

  • Identify and analyze major threats to information systems, including malware, ransomware, phishing, DDoS attacks, and social engineering.
  • Understand and apply basic TCP/IP protocols in network security.
  • Comprehend the basics of penetration testing and implement them in protecting network systems.
  • Apply acquired knowledge in securing information systems.

Upon successful completion, participants will receive:

  • Foundational knowledge and skills applicable in both professional and personal settings
  • A strong base for further learning and specialization in cybersecurity
  • 1 ECTS credit upon passing the final exam
  • A certificate of completion awarded by RIT Croatia

Program Content (Modules)

Goal: Introduce participants to the basics of cybersecurity and its significance in the modern world.

Content:

  • Definition of cybersecurity
  • History and evolution of cyber threats
  • Key concepts: Confidentiality, Integrity, Availability (CIA triad)
  • Current threats and challenges

Methodology: Lecture with real-world case studies and discussions

2.1. Major Cyber Threats (2 hours)

Goal: Familiarize participants with common cyber threats in electronic business.

Content:

  • Classification of threats (external vs. internal)
  • Examples: Malware, ransomware, phishing, DDoS attacks, social engineering
  • Impact of threats on businesses
  • Case study analysis: Real incidents and their consequences

Methodology: Lecture with case studies and discussions

2.2. Basics of Penetration Testing (1 hour)

Goal: Introduce penetration testing as a security assessment method.

Content:

  • What is penetration testing, and why is it important?
  • Phases of penetration testing: Planning, discovery, exploitation, reporting
  • Overview of penetration testing tools (e.g., Nmap, Metasploit, Burp Suite)
  • Legal and ethical aspects of testing
  • Case studies and analysis of penetration test results

Methodology: Lecture with examples and discussions

3.1. Overview of TCP/IP Protocols (2 hours)

Goal: Understand the function of key TCP/IP protocols in network security.

Content:

  • Overview of the TCP/IP model: Layers and functions
  • Key protocols: IP, TCP, UDP, DNS, HTTP/HTTPS
  • Security aspects of protocols: Encryption, authentication, integrity checks
  • Common security issues (e.g., spoofing, man-in-the-middle attacks)
  • Case studies of protocol exploitation

Methodology: Lecture with real-world examples

3.2. Functions of Network Devices (2 hours)

Goal: Explain the functions of network devices and their role in network security.

Content:

  • Overview of network devices: Routers, switches, firewalls, IDS/IPS systems
  • Security functions of devices: Filtering, network segmentation, threat detection
  • Application of network devices in security architectures
  • Real-world case studies on network device security

Methodology: Lecture with discussions and case studies

Goal: Summarize key concepts through discussion and assess participants’ understanding.

Content:

  • Review of key program concepts
  • Discussion of real-world cybersecurity cases
  • Q&A session and clarification of participants' doubts
  • Methodology: Lecture with discussion and final evaluation (written exam)

How To Apply?

  • Application Deadline: March 14, 2025
  • Program Start Date: March 17, 2025

In line with our efforts to promote the importance of continuous learning and skill development, we are offering free participation in the program for the first group of participants. Spots are limited—secure your place now!

APPLY NOW