Cyber Security in 90 Minutes

Course

Online

£ 30 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

This course aims to point out the security essentials for any given IT organization. The course enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments. The course targets the IT security beginners as well as professionals to enrich their knowledge about cyber security and to pursue their career in such field. The course material is based on my understanding of several IT security curricula such as SANS, CEH, etc.The course is meant to be brief to fit security specialists, IT admins, and developers.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Brief description of the ten main axes of cyber security in any IT organization

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Wireless
  • Media
  • IDS
  • Systems
  • Operating Systems
  • Switches
  • IDS training
  • Networks
  • Access
  • Access Control

Course programme

Securing Passwords 1 lecture 09:18 Securing Passwords Passwords and access control security Securing Passwords 1 lecture 09:18 Securing Passwords Passwords and access control security Securing Passwords Passwords and access control security Securing Passwords Passwords and access control security Securing Passwords Passwords and access control security Securing Passwords Passwords and access control security Passwords and access control security Passwords and access control security Securing Operating Systems 1 lecture 09:30 Securing Operating Systems Operating systems upgrade and updating Securing Operating Systems 1 lecture 09:30 Securing Operating Systems Operating systems upgrade and updating Securing Operating Systems Operating systems upgrade and updating Securing Operating Systems Operating systems upgrade and updating Securing Operating Systems Operating systems upgrade and updating Securing Operating Systems Operating systems upgrade and updating Operating systems upgrade and updating Operating systems upgrade and updating Firewalls 1 lecture 10:51 Firewalls Firewalls types, rules, and configuration Firewalls 1 lecture 10:51 Firewalls Firewalls types, rules, and configuration Firewalls Firewalls types, rules, and configuration Firewalls Firewalls types, rules, and configuration Firewalls Firewalls types, rules, and configuration Firewalls Firewalls types, rules, and configuration Firewalls types, rules, and configuration Firewalls types, rules, and configuration Securing Switches 1 lecture 08:46 Securing Switches VLANs and port security Securing Switches 1 lecture 08:46 Securing Switches VLANs and port security Securing Switches VLANs and port security Securing Switches VLANs and port security Securing Switches VLANs and port security Securing Switches VLANs and port security VLANs and port security VLANs and port security Securing Routers 1 lecture 07:42 Securing Routers ACLs and Subnetting Securing Routers 1 lecture 07:42 Securing Routers ACLs and Subnetting Securing Routers ACLs and Subnetting Securing Routers ACLs and Subnetting Securing Routers ACLs and Subnetting Securing Routers ACLs and Subnetting ACLs and Subnetting ACLs and Subnetting Securing Wireless Networks 1 lecture 09:23 Securing Wireless Networks Access point and wireless media security Securing Wireless Networks 1 lecture 09:23 Securing Wireless Networks Access point and wireless media security Securing Wireless Networks Access point and wireless media security Securing Wireless Networks Access point and wireless media security Securing Wireless Networks Access point and wireless media security Securing Wireless Networks Access point and wireless media security Access point and wireless media security Access point and wireless media security IDS, IPS, and Honeypots 1 lecture 10:51 IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots IDS, IPS, and Honeypots 1 lecture 10:51 IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots The security of IDS, IPS, and using Honeypots The security of IDS, IPS, and using Honeypots Antiviruses 1 lecture 08:58 Antiviruses Antiviruses selection and updating Antiviruses 1 lecture 08:58 Antiviruses Antiviruses selection and updating Antiviruses Antiviruses selection and updating Antiviruses Antiviruses selection and updating Antiviruses Antiviruses selection and updating Antiviruses Antiviruses selection and updating Antiviruses selection and updating Antiviruses selection and updating Encryption 1 lecture 05:07 Encryption Encrypting data while resident or transient Encryption 1 lecture 05:07 Encryption Encrypting data while resident or transient Encryption Encrypting data while resident or transient Encryption Encrypting data while resident or transient Encryption Encrypting data while resident or transient Encryption Encrypting data while resident or transient Encrypting data while resident or transient Encrypting data while resident or transient Physical Security 1 lecture 07:04 Physical Security Securing IT premises Physical Security 1 lecture 07:04 Physical Security Securing IT premises Physical Security Securing IT premises Physical Security Securing IT premises Physical Security Securing IT premises Physical Security Securing IT premises Securing IT premises Securing IT premises

Additional information

IT basic knowledge Computer basic knowledge Microsoft Windows basic knowledge

Cyber Security in 90 Minutes

£ 30 + VAT