Cyber Security Diploma Level 3 - CPD Certified & IAO Approved
Course
Online
Take the first step on an incredible journey!
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Class hours
42h
-
Duration
Flexible
-
Start date
Different dates available
Cybersecurity is the state of being protected against the criminal or unauthorized use of the electronic data. Cybersecurity is a preventative technique to prevent the integrity of networks, programs and data from cyber attack, damage and unauthorized access.
The knowledge of cybersecurity and internet security is a must nowadays because of the rise of hackers and cyberspace. Any institution needs to be prepared to protect against the threats in cyberspace. The people involved in cybersecurity must need to the basic principles and practices of cybersecurity to protect their institution. The course provides the necessary skills needed to protect networks, secure electronic assets, prevent attacks, ensure privacy, and build secure infrastructures. The course includes information security, ethical and legal practices, and mitigating cyber vulnerabilities. You will also learn the procedures for incident response and analysis.
Important information
Price for Emagister users:
Facilities
Location
Start date
Start date
About this course
There is no experience or previous qualifications required for enrolment on this course. It is available to all students of all academic backgrounds.
On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods.
Reviews
Subjects
- Internet Security
- Risk
- Networks
- Internet
- Network
- Engineering
- IT risk
- IT Security
- Network Training
- Internet Security Management
Teachers and trainers (1)
Adams Academy
Instructor
Course programme
COURSE CURRICULUM
Cyber Security Basics
Introduction
Child Safety Online
Secure Payment Sites
Online Banking
How To Keep Your Password Safe
Common Scams
How I Got Pharmed
Virus Protection
Self Maintenance
Personal Information Online
Is The Internet Safe?
Importance of Cyber Security
Threat Detection and Response
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Classify Threats and Threat Profiles
Perform Ongoing Threat Research
Perform Ongoing Threat Research – Demo-01
Implement Threat Modeling
Assess the Impact of Reconnaissance Incidents
Assess the Impact of Reconnaissance Incidents – Demo 01
Assess the Impact of Reconnaissance Incidents – Demo 02
Assess the Impact of Social Engineering
Assess the Impact of Social Engineering – Demo 01
Assess the Impact of Social Engineering – Demo 02
Assess the Impact of System Hacking Attacks
Assess the Impact of System Hacking Attacks – Demo 01
Assess the Impact of Web Based Attacks
Assess the Impact of Web-Based Attacks – Demo 01
Assess the Impact of Malware
Assess the Impact of Malware – Demo 01
Assess the Impact of Hijacking and Impersonation Attacks
Assess the Impact of DoS Incidents
Assess the Impact of DoS Incidents – Demo 01
Assess the Impact of Threats to Mobile Security
Assess the Impact of Threats to Cloud Security
Assess Command and Control Techniques
Assess Command and Control Techniques – Demo 01
Assess Persistence Techniques
Assess Persistence Techniques – Demo 01
Assess Lateral Movement and Pivoting Techniques
Assess Data Exfiltration Techniques
Assess Data Exfiltration Techniques – Demo 01
Assess Anti Forensics Techniques
Assess Anti-Forensics Techniques Demo 01
Conduct Vulnerability Assessments
Conduct Vulnerability Assessments – Demo 01
Conduct Vulnerability Assessments – Demo 02
Conduct Penetration Tests on Network Assets
Follow Up on Penetration Testing
Deploy a Security Intelligence Collection and Analysis Platform
Collect Data from Network Based Intelligence Sources
Collect Data from Network-Based Intelligence Sources – Demo 01
Collect Data from Host Based Intelligence Sources
Collect Data from Host-Based Intelligence Sources – Demo 01
Collect Data from Host-Based Intelligence Sources Demo – 02
Use Common Tools to Analyze Logs
Use Common Tools to Analyze Logs – Demo 01
Use SIEM Tools for Analysis
Use SIEM Tools for Analysis – Demo 01
Parse Log Files with Regular Expressions
Analyze Incidents with Windows-Based Tools
Analyze Incidents with Windows-Based Tools – Demo 01
Analyze Incidents with Linux Based Tools
Analyze Incidents with Linux-Based Tools – Demo 01
Analyze Malware
Analyze Malware – Demo 01
Analyze Indicators of Compromise
Analyze Indicators of Compromise – Demo 01
Deploy an Incident Handling and Response Architecture
Mitigate Incidents
Mitigate Incidents – Demo 01
Mitigate Incidents Demo 02
Mitigate Incidents Demo 03
Prepare for Forensic Investigation as a CSIRT
Apply a Forensic Investigation Plan
Securely Collect and Analyze Electronic Evidence
Securely Collect and Analyze Electronic Evidence – Demo 01
Securely Collect and Analyze Electronic Evidence – Demo 02
Follow Up on the Results of an Investigation
Checklist Of Protection
Internet Security Management
Internet Security- The Truth About Identify Theft
Internet Security for Teens- What You Need to Do
Internet Security-Downloading Email Attachments
Internet Security- 5 Tips for Using Facebook
Internet Security- 8 Tips to Protect Yourself When Dating Online
Internet Security for Teens and Tweens- 10 Tips to Keep You Protected
Internet Security- Parental Control Software
Internet Security- Online Safety for Your Children
Cyber Bullying- Another Aspect of Breaking Internet Security
Tips to Ensure Internet Security
Internet Security- Downloading Music off the Internet
Internet Security- Protect Your Wireless Connection
Internet Security- How to Deal with Spyware
Internet Security- Protecting Yourself When You Shop Online
Internet Security- Make Sure Your Passwords Protect You
Make Sure Your Emails Are Safe: Tips for Internet Security
Internet Security- Why Should You Use a Firewall?
Internet security-Signs That Your Child’s Safety Might Be Compromised
Internet Security- Safety When Using Public Computers
Internet Security- Storing Your Password on Your Computer
Internet Security-Using Social Utility Sites
IT Security
Spyware Can Destroy
How Does Spyware Spread?
How To Remove Spyware
Anti Spyware Program
The Anti Anti-Spyware Programs
Research And Learn More
Choosing The Best Anti Spyware Tool
Computer Security And Spyware
The Programs To Avoid
Is It Legal?
Cyber Security Diploma Level 3 - CPD Certified & IAO Approved