CYBER SECURITY PROFESSIONAL CERTIFICATION PROGRAMME

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

The Cyber Security Professional Package is a prestige selection of IT and cyber security courses that will build your knowledge of key technologies and concepts from the ground up. This comprehensive package has the cyber security training needed to ...

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Network Training
  • Systems
  • Network
  • Windows
  • Computing

Course programme

  • Introduction to course
  • Identifying Computer Hardware
  • Identifying Computer Software
  • Setting Up a Basic Workstation
  • Configuring Network Access
  • Working with Files, Folders, and Applications
  • Configuring and Using Wireless Devices
  • Securing Computing Devices
  • Supporting Computers and Users
  • Mapping Course Content
  • Lesson Labs and Solutions
  • Glossary and Index
  • Quiz
  • Motherboards, processors and memory
  • Storage devices and power supplies
  • Peripheral devices and expansion
  • Display devices
  • Custom configurations
  • Networking fundamentals
  • Introduction to TCP/IP
  • Installing wireless and SOHO networks
  • Laptops and mobile devices
  • Installing and configuring printers
  • Hardware and network troubleshooting
  • Operating system basics
  • Working with Windows 8/8.1, Windows 7, Windows Vista and Mac OS and Linux
  • Detailed security
  • Network services, cloud computing and virtualisation
  • Mobile operating systems and connectivity
  • Troubleshooting theory, operating systems and security
  • Various operational procedures
  • Introduction
  • Introduction to Networks
  • The Open Systems Interconnection Specifications
  • Networking Topologies, Connectors, and Wiring Standards
  • The Current Ethernet Specifications
  • Networking Devices
  • Introduction to the Internet Protocol
  • IP Addressing
  • IP Subnetting, Troubleshooting IP, and Introduction to NAT
  • Introduction to IP Routing
  • Routing Protocols
  • Switching and Virtual LANs
  • Wireless Networking
  • Authentication and Access Control
  • Network Threats and Mitigation
  • Physical Security and Risk
  • Wide Area Networks
  • Troubleshooting Tools
  • Software and Hardware Tools
  • Network Troubleshooting
  • Management, Monitoring, and Optimization
  • Introduction
  • Managing Risk
  • Monitoring and Diagnosing Networks
  • Understanding Devices and Infrastructure
  • Identity and Access Management
  • Wireless Network Threats
  • Securing the Cloud
  • Host, Data, and Application Security
  • Cryptography
  • Threats, Attacks, and Vulnerabilities
  • Social Engineering and Other Foes
  • Security Administration
  • Disaster Recovery and Incident Response
  • Appendix A
  • Appendix B
  • Assessing Information Security Risk
  • Analysing the Threat Landscape
  • Analysing Reconnaissance Threats to Computing and Network Environments
  • Analysing Attacks on Computing and Network Environments
  • Analysing Post-Attack Techniques
  • Managing Vulnerabilities in the Organization
  • Implementing Penetration Testing to Evaluate Security
  • Collecting Cybersecurity Intelligence
  • Analysing Log Data
  • Performing Active Asset and Network Analysis
  • Responding to Cybersecurity Incidents
  • Investigating Cybersecurity Incidents
  • Addressing Security Architecture Issues
  • Appendix A: Mapping Course Content to CyberSec First Responder (Exam CFR-210)
  • Appendix B: Mapping Course Content to CompTIA® CyberSecurity Analyst+ (Exam CS0-001)
  • Appendix C: Security Resources
  • Appendix D: U.S. Department of Defence Operational Security
  • Course Focus
  • The Service Lifecycle
  • Key Concepts and Definitions
  • Service Strategy
  • Service Design
  • Service Operation
  • Functions
  • Roles
  • Technology and Architecture
  • Course Introduction
  • Business & Technical Logistics of Pen Testing
  • Information Gathering Reconnaissance – Passive (External)
  • Detective Live Systems – Reconnaissance (Active)
  • Banner Grabbing and Enumeration
  • Automated Vulnerability Assessment
  • Hacking Operating Systems
  • Advanced Assessment and Exploitation Techniques
  • Evasion Techniques
  • Hacking with PowerShell
  • Networks and Sniffing
  • Accessing and Hacking Web Techniques
  • Mobile and IoT Hacking
  • Report Writing Basics
  • Linux Fundamentals
  • Additional information

    Learn to identify computer hardware including types of devices, internal components, connectors and peripheral devices. Learn to identify computer software and compare the functions and features of common operating systems. Get to grips with setting up a basic workstation. Look at configuring network access. Learn how to create, navigate and manage files – including how to compress and extract. Understand how to create screen captures. Study the configuration and use of wireless devices. Understand the security of computing devices including identifying threats, best practice and secure web browsing. Look at environmental and safety concepts surrounding computer use. Learn to back up and restore data, manage software and implement basic support measures.

    CYBER SECURITY PROFESSIONAL CERTIFICATION PROGRAMME

    Price on request