With this Complete Cyber Security Course you will understand how hackers hack, how trackers track, and what you can do to stop them. You will know the global tracking and hacking infrastructures that exist and how to mitigate them. This course covers the fundamental building blocks of your required skillset – You will understand the threat and vulnerability landscape through threat modelling and the risk assessment. You will be able to work with all major platforms including Windows, MacOS, Linux, iOS, Android and even firmware security. You will gain an advanced practical skillset in defeating all online threats – advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance.
At last, you will master network security, firewalls, encryption, and how to stay anonymous online, password and email security, authentication, anti-virus, and end-point-protection.
Method of Assessment:
Upon conclusion of the course, there’s an online multiple-choice quiz assessment, which will determine whether you have passed the course. The test is marked immediately and results are published instantly (60% pass mark).
Certification:
Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.
Requirements
There are no academic entry requirements for this course, and it is open to students of all academic backgrounds.
Course Curriculum
Computer Fundamentals | |||
Advanced Terms | 00:15:00 | ||
Networking Basics | 00:15:00 | ||
Basic Internet Concepts | 00:30:00 | ||
Internet Security | 00:30:00 | ||
Computers in the Workplace | 00:15:00 | ||
Tele-Commuting | 00:15:00 | ||
The Electronic World | 00:15:00 | ||
Ergonomics | 00:15:00 | ||
Safety and the Environment | 00:15:00 | ||
Being Proactive | 00:15:00 | ||
Identifying Yourself | 00:15:00 | ||
Protecting Your Data | 01:00:00 | ||
Understanding Malware | 00:15:00 | ||
Protecting Against Malware | 00:15:00 | ||
Malware Protection | |||
Why You Need To Worry About “Malware” | 01:00:00 | ||
Viruses | 01:00:00 | ||
Spyware/Adware | 01:00:00 | ||
Safety & Security at the Browser Level | 01:00:00 | ||
Spyware Can Destroy | 00:30:00 | ||
How Does Spyware Spread? | 01:00:00 | ||
How To Remove Spyware | 01:00:00 | ||
Anti Spyware Program | 01:00:00 | ||
The Anti Anti-Spyware Programs | 00:30:00 | ||
Research And Learn More | 00:30:00 | ||
Choosing The Best Anti Spyware Tool | 01:00:00 | ||
Computer Security And Spyware | 01:00:00 | ||
The Programs To Avoid | 00:15:00 | ||
Is It Legal? | 00:30:00 | ||
Checklist Of Protection | 00:15:00 | ||
Glossary of Terms | 01:00:00 | ||
Cyber Security Basics | |||
Child Safety Online | 01:00:00 | ||
Secure Payment Sites | 01:00:00 | ||
Online Banking | 00:30:00 | ||
How To Keep Your Password Safe | 00:30:00 | ||
Common Scams | 01:00:00 | ||
How I Got Pharmed | 01:00:00 | ||
Virus Protection | 01:00:00 | ||
Self Maintenance | 00:30:00 | ||
Personal Information Online | 01:00:00 | ||
Is The Internet Safe? | 00:30:00 | ||
Importance of Cyber Security | 00:30:00 | ||
Internet Security Management | |||
Internet Security- The Truth About Identify Theft | 01:00:00 | ||
Internet Security for Teens- What You Need to Do | 01:00:00 | ||
Internet Security-Downloading Email Attachments | 00:15:00 | ||
Internet Security- 5 Tips for Using Facebook | 00:30:00 | ||
Internet Security- 8 Tips to Protect Yourself When Dating Online | 00:30:00 | ||
Internet Security for Teens and Tweens- 10 Tips to Keep You Protected | 00:15:00 | ||
Internet Security- Parental Control Software | 00:30:00 | ||
Internet Security- Online Safety for Your Children | 00:30:00 | ||
Cyber Bullying- Another Aspect of Breaking Internet Security | 00:30:00 | ||
Tips to Ensure Internet Security | 00:30:00 | ||
Internet Security- Downloading Music off the Internet | 01:00:00 | ||
Internet Security- Protect Your Wireless Connection | 00:30:00 | ||
Internet Security- How to Deal with Spyware | 00:15:00 | ||
Internet Security- Protecting Yourself When You Shop Online | 00:15:00 | ||
Internet Security- Storing Your Password on Your Computer | 01:00:00 | ||
Make Sure Your Emails Are Safe: Tips for Internet Security | 01:00:00 | ||
Internet Security- Why Should You Use a Firewall? | 01:00:00 | ||
Internet security-Signs That Your Child’s Safety Might Be Compromised | 01:00:00 | ||
Internet Security- Safety When Using Public Computers | 01:00:00 | ||
Internet Security- Storing Your Password on Your Computer | 01:00:00 | ||
Internet Security-Using Social Utility Sites | 00:30:00 | ||
IT Security | |||
Spyware Can Destroy | 00:30:00 | ||
How Does Spyware Spread? | 01:00:00 | ||
How To Remove Spyware | 01:00:00 | ||
Anti Spyware Program | 01:00:00 | ||
The Anti Anti-Spyware Programs | 00:30:00 | ||
Research And Learn More | 00:30:00 | ||
Choosing The Best Anti Spyware Tool | 01:00:00 | ||
Computer Security And Spyware | 01:00:00 | ||
The Programs To Avoid | 00:15:00 | ||
Is It Legal? | 00:30:00 | ||
Checklist Of Protection | 00:15:00 | ||
Overview of Wireless Communications | |||
Identify the Importance of Risk Management | FREE | 00:11:00 | |
Assess Risk | 00:13:00 | ||
Mitigate Risk | 00:22:00 | ||
Integrate Documentation into Risk Management | 00:14:00 | ||
Classify Threats and Threat Profiles | 00:07:00 | ||
Perform Ongoing Threat Research | 00:12:00 | ||
Resources that Aid in Research of Threats | 00:03:00 | ||
Implement Threat Modeling | 00:09:00 | ||
Assess the Impact of Reconnaissance Incidents | 00:10:00 | ||
Performing Reconnaissance on a Network | 00:07:00 | ||
Examining Reconnaissance Incidents | 00:08:00 | ||
Assess the Impact of Social Engineering | 00:10:00 | ||
Assessing the impact of Social Engineering9 | 00:07:00 | ||
Assessing the Impact of Phishing | 00:03:00 | ||
Analyzing Attacks on Computing and Network Environments | |||
Assess the Impact of System Hacking Attacks | 00:10:00 | ||
Cracking Passwords Using a Password File | 00:08:00 | ||
Assess the Impact of Web Based Attacks | 00:11:00 | ||
Assessing the Impact of Web-Based Threats | 00:03:00 | ||
Assess the Impact of Malware | 00:08:00 | ||
Malware Detection and Removal | 00:05:00 | ||
Assess the Impact of Hijacking and Impersonation Attacks | 00:13:00 | ||
Assess the Impact of DoS Incidents | 00:09:00 | ||
Assessing the Impact of DoS Attacks | 00:04:00 | ||
Assess the Impact of Threats to Mobile Security | 00:08:00 | ||
Assess the Impact of Threats to Cloud Security | 00:10:00 | ||
Analyzing Post-Attack Techniques | |||
Assess Command and Control Techniques | 00:08:00 | ||
Assessing Command and Control Techniques | 00:10:00 | ||
Assess Persistence Techniques | 00:05:00 | ||
Detecting Rootkits | 00:03:00 | ||
Assess Lateral Movement and Pivoting Techniques | 00:13:00 | ||
Assess Data Exfiltration Techniques | 00:04:00 | ||
Steganography | 00:03:00 | ||
Assess Anti Forensics Techniques | 00:09:00 | ||
Assessing Anti-Forensics | 00:03:00 | ||
Evaluating the Organization’s Security Posture | |||
Conduct Vulnerability Assessments | 00:16:00 | ||
Perform a Vulnerability Scan with Nessus | 00:07:00 | ||
Perform a Vulnerability Scan with MBSA | 00:05:00 | ||
Conduct Penetration Tests on Network Assets | 00:18:00 | ||
Follow Up on Penetration Testing | 00:06:00 | ||
Deploy a Security Intelligence Collection and Analysis Platform | 00:19:00 | ||
Collect Data from Network Based Intelligence Sources | 00:15:00 | ||
Collecting Network-Based Security Intelligence | 00:07:00 | ||
Collect Data from Host Based Intelligence Sources | 00:13:00 | ||
Collecting Host-Based Security Intelligence | 00:15:00 | ||
Parsing Log files | 00:03:00 | ||
Analyzing Log Data | |||
Use Common Tools to Analyze Logs | 00:22:00 | ||
Analyzing Linux Logs for Security Intelligence | 00:08:00 | ||
Use SIEM Tools for Analysis | 00:07:00 | ||
Incorporating SIEMs into Security Intelligence Analysis | 00:18:00 | ||
Parse Log Files with Regular Expressions | 00:25:00 | ||
Analyze Incidents with Windows-Based Tools | 00:17:00 | ||
Windows-Based Incident Analysis Tools | 00:19:00 | ||
Analyze Incidents with Linux Based Tools | 00:05:00 | ||
Linux-Based Incident Analysis Tools | 00:07:00 | ||
Analyze Malware | 00:11:00 | ||
Analyzing Malware | 00:03:00 | ||
Analyze Indicators of Compromise | 00:20:00 | ||
Analyzing Indicators of Compromise | 00:15:00 | ||
Responding to Cyber security Incidents | |||
Deploy an Incident Handling and Response Architecture | 00:22:00 | ||
Mitigate Incidents | 00:16:00 | ||
Hardening Windows Servers | 00:14:00 | ||
DNS Filtering | 00:05:00 | ||
Blacklisting and Whitelisting | 00:09:00 | ||
Prepare for Forensic Investigation as a CSIRT | 00:03:00 | ||
Apply a Forensic Investigation Plan | 00:10:00 | ||
Securely Collect and Analyze Electronic Evidence | 00:08:00 | ||
Securely Collecting Electronic Evidence | 00:05:00 | ||
Analyzing Forensic Evidence | 00:07:00 | ||
Follow Up on the Results of an Investigation | 00:04:00 | ||
Mock Exam | |||
Mock Exam- Complete Cyber Security Course | 00:20:00 | ||
Final Exam | |||
Final Exam- Complete Cyber Security Course | 00:20:00 |
Course Reviews
No Reviews found for this course.