The Cyber Security Professional Package is a prestige selection of IT and cyber security courses that will build your knowledge of key technologies and concepts from the ground up. This comprehensive package has the cyber security training needed to ...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
Subjects
Network Training
Systems
Network
Windows
Computing
Course programme
Introduction to course
Identifying Computer Hardware
Identifying Computer Software
Setting Up a Basic Workstation
Configuring Network Access
Working with Files, Folders, and Applications
Configuring and Using Wireless Devices
Securing Computing Devices
Supporting Computers and Users
Mapping Course Content
Lesson Labs and Solutions
Glossary and Index
Quiz
Motherboards, processors and memory
Storage devices and power supplies
Peripheral devices and expansion
Display devices
Custom configurations
Networking fundamentals
Introduction to TCP/IP
Installing wireless and SOHO networks
Laptops and mobile devices
Installing and configuring printers
Hardware and network troubleshooting
Operating system basics
Working with Windows 8/8.1, Windows 7, Windows Vista and Mac OS and Linux
Detailed security
Network services, cloud computing and virtualisation
Mobile operating systems and connectivity
Troubleshooting theory, operating systems and security
Various operational procedures
Introduction
Introduction to Networks
The Open Systems Interconnection Specifications
Networking Topologies, Connectors, and Wiring Standards
The Current Ethernet Specifications
Networking Devices
Introduction to the Internet Protocol
IP Addressing
IP Subnetting, Troubleshooting IP, and Introduction to NAT
Introduction to IP Routing
Routing Protocols
Switching and Virtual LANs
Wireless Networking
Authentication and Access Control
Network Threats and Mitigation
Physical Security and Risk
Wide Area Networks
Troubleshooting Tools
Software and Hardware Tools
Network Troubleshooting
Management, Monitoring, and Optimization
Introduction
Managing Risk
Monitoring and Diagnosing Networks
Understanding Devices and Infrastructure
Identity and Access Management
Wireless Network Threats
Securing the Cloud
Host, Data, and Application Security
Cryptography
Threats, Attacks, and Vulnerabilities
Social Engineering and Other Foes
Security Administration
Disaster Recovery and Incident Response
Appendix A
Appendix B
Assessing Information Security Risk
Analysing the Threat Landscape
Analysing Reconnaissance Threats to Computing and Network Environments
Analysing Attacks on Computing and Network Environments
Analysing Post-Attack Techniques
Managing Vulnerabilities in the Organization
Implementing Penetration Testing to Evaluate Security
Collecting Cybersecurity Intelligence
Analysing Log Data
Performing Active Asset and Network Analysis
Responding to Cybersecurity Incidents
Investigating Cybersecurity Incidents
Addressing Security Architecture Issues
Appendix A: Mapping Course Content to CyberSec First Responder (Exam CFR-210)
Appendix D: U.S. Department of Defence Operational Security
Course Focus
The Service Lifecycle
Key Concepts and Definitions
Service Strategy
Service Design
Service Operation
Functions
Roles
Technology and Architecture
Course Introduction
Business & Technical Logistics of Pen Testing
Information Gathering Reconnaissance – Passive (External)
Detective Live Systems – Reconnaissance (Active)
Banner Grabbing and Enumeration
Automated Vulnerability Assessment
Hacking Operating Systems
Advanced Assessment and Exploitation Techniques
Evasion Techniques
Hacking with PowerShell
Networks and Sniffing
Accessing and Hacking Web Techniques
Mobile and IoT Hacking
Report Writing Basics
Linux Fundamentals
Additional information
Learn to identify computer hardware including types of devices, internal components, connectors and peripheral devices.
Learn to identify computer software and compare the functions and features of common operating systems.
Get to grips with setting up a basic workstation.
Look at configuring network access.
Learn how to create, navigate and manage files – including how to compress and extract.
Understand how to create screen captures.
Study the configuration and use of wireless devices.
Understand the security of computing devices including identifying threats, best practice and secure web browsing.
Look at environmental and safety concepts surrounding computer use.
Learn to back up and restore data, manage software and implement basic support measures.