Online Training Programs

Online Training Programs
NSCC CISCO SACOC logos

The Strait Area Chamber of Commerce has partnered with the NSCC and Cisco Systems to provide FREE access to our Chamber Members to a series of online NetAcad™ Courses! There is no previous knowledge required, and no requirement or time limit to complete the course once you start. You can learn at your own pace and in the comfort of your own space!

 

Courses available:

 

Get Connected – Introductory course for students interested in learning the basics of IT, including the Internet, and social media.
Intro to Cyber Security – Explore cyber trends, threats and staying safe in cyberspace, and protecting personal and company data.
Intro to the Internet of Things (IoT) – Learn how the Internet of Things enables the Digital Transformation along with emerging technologies such as data analytics, artificial intelligence and the increased attention to cybersecurity.
Intro to Packet Tracer – Covers the Packet Tracer user interface, creating a simple network of networking and IoT devices, using Simulation mode to verify device connectivity, modifying environmental elements, and programming the IoT devices.
Entrepreneurship – Helps you develop an entrepreneurial mindset and skills such as business planning, negotiation, financial literacy, and problem solving.

 

Scroll down for course descriptions

 

Click the button below to sign up! You’ll need to enter your email address, and we’ll email a link and an access code to you within 24 hours. It’s that easy!

CISCO Networking Academy Registration Guide – Click to Download

.

If you need any help signing up for any of the CISCO Networking Academy Courses, please contact us at membership@straitareachamber.ca or call 902-625-1588

Course Descriptions

Get Connected

 

Chapter 1 – Computer Basics – Identify different types of computer systems, internal components, and peripherals.
Chapter 2 – Files and Directories Understand the directory structure of Microsoft Windows and how to work with files and folders using a text editor.
Chapter 3 – All About the Internet Understand computer networking, how to browse and search the Internet, and how to use email.
Chapter 4 – Exploring the Human Network Create and use various types of social media accounts, including Facebook, LinkedIn, and YouTube.
Chapter 5 – Keep Yourself Connected Identify common problems and implement simple solutions for hardware, software, and networks.

 

Learning Outcomes

 

  • Identify and describe the different types of computers
  • Differentiate between what is hardware and softwares
  • Identify input and output devices
  • Describe the difference between different operating systems
  • Identify different basic types of hardware and software
  • How to turn on and properly turn off a computer
  • Navigate a Windows desktop computer and open programs
  • Identify different types of files and browse through computer folders
  • Create, save, open and edit text documents on a computer
  • Explain what is a computer network and how computers communicate
  • Describe how the internet works and identify basic internet services
  • Surf the internet using a computer browser
  • Describe how a computer connects to the internet and the different connection types
  • Create an email account and send and receive email
  • Use different internet tools and sites for study and job opportunities
  • Create and use a Facebook and LinkedIn accounts

Intro to Cyber Security

 

Chapter 1 – The Need for Cybersecurity – Learn the need for and importance of cybersecurity and understand the characteristics and value of personal data, and data within an organization.
Chapter 2 – Attacks, Concepts and Techniques – Recognize the characteristics and operation of a cyber attack, interpret the trends in the cyber threat landscape.
Chapter 3 – Protecting Your Data and Privacy – Understand how to protect devices from threats and master how to safeguard your privacy.
Chapter 4 – Protecting the Organization – Learn techniques to protect organizations from cyber attacks, recognize the behavior-based approach to cybersecurity
Chapter 5 – Will Your Future Be in Cybersecurity? – Understand legal and ethical issues in cybersecurity, explore the opportunities for pursuing an education and a career in cybersecurity.

 

Learning Outcomes

 

  • Students learn the basics of being safe online.
  • Students are introduced to different types of malware and attacks, and how organizations are protecting themselves against these attacks.
  • Students explore the career options in cybersecurity.
  • The language used to describe cybersecurity concepts is designed to be easily understood by learners at all levels and embedded interactive activities help reinforce comprehension.
  • Activities, including paper-based labs, videos, and quizzes, address a variety of learning styles and help stimulate learning and promote increased knowledge retention.

Internet of Things (IoT)

 

Chapter 1 – Everything is Connected – Explain the meaning and impact of digital transformation
Chapter 2 – Everything Becomes Programmable – Apply basic programming to support IoT devices.
Chapter 3 – Everything Generates Data – Explain how data provides value to digital business and society.
Chapter 4 – Everything Can be Automated – Explain the benefits of automation with machine learning and artificial intelligence in the digitized world.
Chapter 5 – Everything Needs to be Secured – Explain the need for enhanced security in the digitized world.
Chapter 6 – Educational and Business Opportunities – Discover job opportunities provided by the digital transformation, learning opportunities with NetAcad, and value of communities of interest engagements such as DevNet, Learning@Cisco and IEEE.

 

Learning Outcomes

 

  • Explain the meaning and impact of Digital Transformation.
  • Apply basic programming to support IoT devices.
  • Explain how data provides value to Digital Business and Society.
  • Explain the benefits of automation in the digitized world.
  • Explain the need for enhanced security in the digitized world.
  • Discover opportunities provided by digital transformation.

Intro to Packet Tracer

 

Chapter 1 – Introduction to Packet Tracer – Build a network from scratch, use a pre-built sample network, download and install Packet Tracer, authenticate Packet Tracer with NetAcad.com logon ID
Chapter 2 – Packet Tracer User Interface – Add networking devices and connect them via cables and wireless, configure the intermediate and end devices that make up the network
Chapter 3 – Packet Tracer Simulation Mode – Create a simple PDU to replicate the ICMP and ARP functionality of a ping in Simulation mode, view the contents of the PDUs to verify connectivity, verify functionality, and troubleshoot
Chapter 4 – Packet Tracer Physical View, and File Assessment Types – Make your network more realistic by adding backgrounds, buildings, and wiring closets, learn the different Packet Tracer file types: .pkt, .pkz, and .pka, and learn the different assessment types using Packet Tracer: PTMO (Packet Tracer as a Media Object) and PTSA (Packet Tracer Skills Assessment)
Chapter 5 – IoT Components in Packet Tracer – Locate the IoT devices for a Smart Home, Smart City, Industry and Smart Grid, and interact and connect the IoT devices in a Smart Home to a Home Gateway
Chapter 6 – Creating and Controlling a Smart Home Network – Locate, deploy, configure and register the smart devices with the Home Gateway, register the smart devices with a dedicated Registration Server
Chapter 7 – Packet Tracer Environment Controls – Identify and configure the different environment elements that may affect the IoT devices, modify the sunlight and wind speed environment elements and view their effect on the and , using sunlight as an example
Chapter 8 – Creating and Programming Objects in Packet Tracer – Learn how to create a Thing: Push Button and Toggle Push Button, learn how to leverage an existing script to create a new Thing

 

Learning Outcomes

 

  • Explain the function and installation of Packet Tracer.
  • Create a simple simulated network using Packet Tracer.
  • Investigate network functionality using simulation mode.
  • Investigate the Packet Tracer physical view.
  • Identify different uses of Packet Tracer.Configure IoT devices in Packet Tracer.
  • Connect and control IoT devices to a network using a Home Gateway and a Registration Server.
  • Modify the environmental conditions within a Packet Tracer physical container.
  • Create and Program Objects in Packet Tracer.

Entrepreneurship

 

Chapters are in the form of case studies to achieve the following learning outcomes.

 

Learning Outcomes

 

  • Identify skills that have value in the marketplace.
  • Explain the social, legal, and ethical responsibilities of an entrepreneur.
  • Describe the ways in which a business receives income.
  • Describe the basic elements of a customer sales presentation.
  • Organize important business records.
  • Explain tools that businesses use to grow.
  • Define common business terminology
  • Identify and research a business opportunity
  • Practice the decision making process
  • Work as part of a business team
  • Prepare a simplified business plan
  • Define common marketing terminology
  • Explain variances in sales and cost forecasting
  • Identify frequently used marketing and communication tools
  • Analyze research results
  • Explain the change process
  • Prepare a simplified growth plan
  • Use social media as a research, marketing, and sales tool
  • Transfer skills acquired through previous employment or education to new employment opportunities
  • Identify steps involved in establishing a consulting business
  • Fund and operate a consulting business
  • Identify how broadband applications can be used in business
  • Define a business problem
  • Identify, evaluate, and choose e-business solutions
  • Prepare an implementation plan
  • Evaluate a business using business metrics
  • Define the role of a contractor
  • Explain how a contractor builds relationships with other businesses
  • Define these relationships using contracts
  • Determine where to find companies that are looking for contractors
  • Explain how to contact potential customers
  • Review current business commitments and resources
  • Identify needed resources
  • Define a business structure to organize and optimize resources
  • Develop ways to communicate within the business structure
  • Explain the importance of good financial management
  • Recognize expansion opportunities

Minimum System Requirements

 

  • Computer with a minimum of 4 GB of RAM and 8 GB of free disk space.
  • High speed Internet access to download software and work with online tools.
  • Although it may work on other operating systems and browsers, a Windows operating system with one of the following browsers is recommended: Google Chrome 30+ or Mozilla Firefox 25+.

Not a Chamber Member yet?

Sign up for a Membership and enjoy this and many more benefits!

Your Success is Our Success.