This course aims to point out the security essentials for any given IT organization. The course enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments. The course targets the IT security beginners as well as professionals to enrich their knowledge about cyber security and to pursue their career in such field. The course material is based on my understanding of several IT security curricula such as SANS, CEH, etc.The course is meant to be brief to fit security specialists, IT admins, and developers.
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Brief description of the ten main axes of cyber security in any IT organization
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
Wireless
Media
IDS
Systems
Operating Systems
Switches
IDS training
Networks
Access
Access Control
Course programme
Securing Passwords
1 lecture09:18Securing Passwords Passwords and access control security
Securing Passwords
1 lecture09:18Securing Passwords Passwords and access control security
Securing Passwords Passwords and access control security
Securing Passwords Passwords and access control security
Securing Passwords Passwords and access control security
Securing Passwords Passwords and access control security
Passwords and access control security
Passwords and access control security
Securing Operating Systems
1 lecture09:30Securing Operating Systems Operating systems upgrade and updating
Securing Operating Systems
1 lecture09:30Securing Operating Systems Operating systems upgrade and updating
Securing Operating Systems Operating systems upgrade and updating
Securing Operating Systems Operating systems upgrade and updating
Securing Operating Systems Operating systems upgrade and updating
Securing Operating Systems Operating systems upgrade and updating
Operating systems upgrade and updating
Operating systems upgrade and updating
Firewalls
1 lecture10:51Firewalls Firewalls types, rules, and configuration
Firewalls
1 lecture10:51Firewalls Firewalls types, rules, and configuration
Firewalls Firewalls types, rules, and configuration
Firewalls Firewalls types, rules, and configuration
Firewalls Firewalls types, rules, and configuration
Firewalls Firewalls types, rules, and configuration
Firewalls types, rules, and configuration
Firewalls types, rules, and configuration
Securing Switches
1 lecture08:46Securing Switches VLANs and port security
Securing Switches
1 lecture08:46Securing Switches VLANs and port security
Securing Switches VLANs and port security
Securing Switches VLANs and port security
Securing Switches VLANs and port security
Securing Switches VLANs and port security
VLANs and port security
VLANs and port security
Securing Routers
1 lecture07:42Securing Routers ACLs and Subnetting
Securing Routers
1 lecture07:42Securing Routers ACLs and Subnetting
Securing Routers ACLs and Subnetting
Securing Routers ACLs and Subnetting
Securing Routers ACLs and Subnetting
Securing Routers ACLs and Subnetting
ACLs and Subnetting
ACLs and Subnetting
Securing Wireless Networks
1 lecture09:23Securing Wireless Networks Access point and wireless media security
Securing Wireless Networks
1 lecture09:23Securing Wireless Networks Access point and wireless media security
Securing Wireless Networks Access point and wireless media security
Securing Wireless Networks Access point and wireless media security
Securing Wireless Networks Access point and wireless media security
Securing Wireless Networks Access point and wireless media security
Access point and wireless media security
Access point and wireless media security
IDS, IPS, and Honeypots
1 lecture10:51IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots
IDS, IPS, and Honeypots
1 lecture10:51IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots
IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots
IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots
IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots
IDS, IPS, and Honeypots The security of IDS, IPS, and using Honeypots
The security of IDS, IPS, and using Honeypots
The security of IDS, IPS, and using Honeypots
Antiviruses
1 lecture08:58Antiviruses Antiviruses selection and updating
Antiviruses
1 lecture08:58Antiviruses Antiviruses selection and updating
Antiviruses Antiviruses selection and updating
Antiviruses Antiviruses selection and updating
Antiviruses Antiviruses selection and updating
Antiviruses Antiviruses selection and updating
Antiviruses selection and updating
Antiviruses selection and updating
Encryption
1 lecture05:07Encryption Encrypting data while resident or transient
Encryption
1 lecture05:07Encryption Encrypting data while resident or transient
Encryption Encrypting data while resident or transient
Encryption Encrypting data while resident or transient
Encryption Encrypting data while resident or transient
Encryption Encrypting data while resident or transient
Encrypting data while resident or transient
Encrypting data while resident or transient
Physical Security
1 lecture07:04Physical Security Securing IT premises
Physical Security
1 lecture07:04Physical Security Securing IT premises
Physical Security Securing IT premises
Physical Security Securing IT premises
Physical Security Securing IT premises
Physical Security Securing IT premises
Securing IT premises
Securing IT premises
Additional information
IT basic knowledge
Computer basic knowledge
Microsoft Windows basic knowledge