• LOGIN
  • No products in the cart.

With this Complete Cyber Security Course you will understand how hackers hack, how trackers track, and what you can do to stop them. You will know the global tracking and hacking infrastructures that exist and how to mitigate them. This course covers the fundamental building blocks of your required skillset – You will understand the threat and vulnerability landscape through threat modelling and the risk assessment. You will be able to work with all major platforms including Windows, MacOS, Linux, iOS, Android and even firmware security.  You will gain an advanced practical skillset in defeating all online threats – advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance.

At last, you will master network security, firewalls, encryption, and how to stay anonymous online, password and email security, authentication, anti-virus, and end-point-protection.

Method of Assessment:

Upon conclusion of the course, there’s an online multiple-choice quiz assessment, which will determine whether you have passed the course. The test is marked immediately and results are published instantly (60% pass mark).

Certification:

Certificates can be obtained at an additional cost of £9.99 for PDF, £16.99 for Printed Hardcopy format and £24.99 for Both for Both PDF and Hardcopy Certificates.

Requirements

There are no academic entry requirements for this course, and it is open to students of all academic backgrounds.

Course Curriculum

Computer Fundamentals
Advanced Terms 00:15:00
Networking Basics 00:15:00
Basic Internet Concepts 00:30:00
Internet Security 00:30:00
Computers in the Workplace 00:15:00
Tele-Commuting 00:15:00
The Electronic World 00:15:00
Ergonomics 00:15:00
Safety and the Environment 00:15:00
Being Proactive 00:15:00
Identifying Yourself 00:15:00
Protecting Your Data 01:00:00
Understanding Malware 00:15:00
Protecting Against Malware 00:15:00
Malware Protection
Why You Need To Worry About “Malware” 01:00:00
Viruses 01:00:00
Spyware/Adware 01:00:00
Safety & Security at the Browser Level 01:00:00
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
Glossary of Terms 01:00:00
Cyber Security Basics
Child Safety Online 01:00:00
Secure Payment Sites 01:00:00
Online Banking 00:30:00
How To Keep Your Password Safe 00:30:00
Common Scams 01:00:00
How I Got Pharmed 01:00:00
Virus Protection 01:00:00
Self Maintenance 00:30:00
Personal Information Online 01:00:00
Is The Internet Safe? 00:30:00
Importance of Cyber Security 00:30:00
Internet Security Management
Internet Security- The Truth About Identify Theft 01:00:00
Internet Security for Teens- What You Need to Do 01:00:00
Internet Security-Downloading Email Attachments 00:15:00
Internet Security- 5 Tips for Using Facebook 00:30:00
Internet Security- 8 Tips to Protect Yourself When Dating Online 00:30:00
Internet Security for Teens and Tweens- 10 Tips to Keep You Protected 00:15:00
Internet Security- Parental Control Software 00:30:00
Internet Security- Online Safety for Your Children 00:30:00
Cyber Bullying- Another Aspect of Breaking Internet Security 00:30:00
Tips to Ensure Internet Security 00:30:00
Internet Security- Downloading Music off the Internet 01:00:00
Internet Security- Protect Your Wireless Connection 00:30:00
Internet Security- How to Deal with Spyware 00:15:00
Internet Security- Protecting Yourself When You Shop Online 00:15:00
Internet Security- Storing Your Password on Your Computer 01:00:00
Make Sure Your Emails Are Safe: Tips for Internet Security 01:00:00
Internet Security- Why Should You Use a Firewall? 01:00:00
Internet security-Signs That Your Child’s Safety Might Be Compromised 01:00:00
Internet Security- Safety When Using Public Computers 01:00:00
Internet Security- Storing Your Password on Your Computer 01:00:00
Internet Security-Using Social Utility Sites 00:30:00
IT Security
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
Overview of Wireless Communications
Identify the Importance of Risk Management FREE 00:11:00
Assess Risk 00:13:00
Mitigate Risk 00:22:00
Integrate Documentation into Risk Management 00:14:00
Classify Threats and Threat Profiles 00:07:00
Perform Ongoing Threat Research 00:12:00
Resources that Aid in Research of Threats 00:03:00
Implement Threat Modeling 00:09:00
Assess the Impact of Reconnaissance Incidents 00:10:00
Performing Reconnaissance on a Network 00:07:00
Examining Reconnaissance Incidents 00:08:00
Assess the Impact of Social Engineering 00:10:00
Assessing the impact of Social Engineering9 00:07:00
Assessing the Impact of Phishing 00:03:00
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks 00:10:00
Cracking Passwords Using a Password File 00:08:00
Assess the Impact of Web Based Attacks 00:11:00
Assessing the Impact of Web-Based Threats 00:03:00
Assess the Impact of Malware 00:08:00
Malware Detection and Removal 00:05:00
Assess the Impact of Hijacking and Impersonation Attacks 00:13:00
Assess the Impact of DoS Incidents 00:09:00
Assessing the Impact of DoS Attacks 00:04:00
Assess the Impact of Threats to Mobile Security 00:08:00
Assess the Impact of Threats to Cloud Security 00:10:00
Analyzing Post-Attack Techniques
Assess Command and Control Techniques 00:08:00
Assessing Command and Control Techniques 00:10:00
Assess Persistence Techniques 00:05:00
Detecting Rootkits 00:03:00
Assess Lateral Movement and Pivoting Techniques 00:13:00
Assess Data Exfiltration Techniques 00:04:00
Steganography 00:03:00
Assess Anti Forensics Techniques 00:09:00
Assessing Anti-Forensics 00:03:00
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments 00:16:00
Perform a Vulnerability Scan with Nessus 00:07:00
Perform a Vulnerability Scan with MBSA 00:05:00
Conduct Penetration Tests on Network Assets 00:18:00
Follow Up on Penetration Testing 00:06:00
Deploy a Security Intelligence Collection and Analysis Platform 00:19:00
Collect Data from Network Based Intelligence Sources 00:15:00
Collecting Network-Based Security Intelligence 00:07:00
Collect Data from Host Based Intelligence Sources 00:13:00
Collecting Host-Based Security Intelligence 00:15:00
Parsing Log files 00:03:00
Analyzing Log Data
Use Common Tools to Analyze Logs 00:22:00
Analyzing Linux Logs for Security Intelligence 00:08:00
Use SIEM Tools for Analysis 00:07:00
Incorporating SIEMs into Security Intelligence Analysis 00:18:00
Parse Log Files with Regular Expressions 00:25:00
Analyze Incidents with Windows-Based Tools 00:17:00
Windows-Based Incident Analysis Tools 00:19:00
Analyze Incidents with Linux Based Tools 00:05:00
Linux-Based Incident Analysis Tools 00:07:00
Analyze Malware 00:11:00
Analyzing Malware 00:03:00
Analyze Indicators of Compromise 00:20:00
Analyzing Indicators of Compromise 00:15:00
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture 00:22:00
Mitigate Incidents 00:16:00
Hardening Windows Servers 00:14:00
DNS Filtering 00:05:00
Blacklisting and Whitelisting 00:09:00
Prepare for Forensic Investigation as a CSIRT 00:03:00
Apply a Forensic Investigation Plan 00:10:00
Securely Collect and Analyze Electronic Evidence 00:08:00
Securely Collecting Electronic Evidence 00:05:00
Analyzing Forensic Evidence 00:07:00
Follow Up on the Results of an Investigation 00:04:00
Mock Exam
Mock Exam- Complete Cyber Security Course 00:20:00
Final Exam
Final Exam- Complete Cyber Security Course 00:20:00

Course Reviews

4.8

4.8
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

492 STUDENTS ENROLLED

Top Sale Courses

COPYRIGHT © 2017 STPAULSCOLLEGE.CO.UK