Course Overview
You’ll have an arsenal of skills to lock down your desired career after completing this Cyber Security course. Moreover, you will have access to all of the materials in this course for free for a whole year and learn a multitude of highly coveted skills to move up the corporate ladder.
With this comprehensive Cyber Security course, you’ll have all of your questions answered and all of the necessary expertise under your belt. Apart from setting you up for success, this course offers numerous advantages to make your learning experience more pleasurable and less stressful. So, add this Cyber Security course to the basket and take your expertise up a notch!
Please Note: Thames College is a One Education approved resale partner for Quality Licence Scheme Endorsed courses.
Why Choose Thames College?
Thames College offers you the benefit of —
- Learn with engaging voice-over and visual elements to facilitate your learning process.
- Get a year's worth of unlimited access to the course.
- Receive round-the-clock access to expert assistance.
- Participate in quick assessments and get instant feedback on your progress.
- Study at your own schedule from the convenience of your own home.
Who Is This Course For?
Those who want to strengthen their professional skills while training for the desired job should take advantage of the Cyber Security training! This course will keep you up-to-date with all the latest developments and coach you accordingly. So invest in this Cyber Security course if you want the best training available.
Certificate of Achievement
Quality Licence Scheme Endorsed Certificate of Achievement
Upon successful completion of the Cyber Security course, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme. The certificate will be home-delivered, with a pricing scheme of —
- 139 GBP within UK
- 149 GBP for International Delivery (Postal Fees Included)
CPD Certification
After successfully completing the assessment of this Cyber Security course, you can apply for the CPD accredited certificates. The PDF version is only £2.99 and the Hardcopy version will cost you £8.99.
Disclaimer
The Cyber Security course has been endorsed under the Quality Licence Scheme. This means that One Education has undergone an external quality check to ensure that the organisation and the courses it offers meet defined quality criteria. The completion of this Cyber Security course alone does not lead to a regulated qualification but may be used as evidence of knowledge and skills gained. The Learner Unit Summary may be used as evidence towards Recognition of Prior Learning if you wish to progress your studies in this subject. To this end the learning outcomes of the Cyber Security course have been benchmarked at Level 5 against level descriptors published by Ofqual, to indicate the depth of study and level of demand/complexity involved in successful completion by the learner.
The Cyber Security course itself has been designed by One Education to meet specific learners’ and/or employers’ requirements which cannot be satisfied through current regulated qualifications.
The Quality Licence Scheme endorsement involves robust and rigorous quality audits by external auditors to ensure quality is continually met. A review of courses is carried out as part of the endorsement process.
Requirements
No formal entry requirements! No prerequisites or relevant experience is required!
This course is accessible to anyone with an eagerness to learn. All you require is—
- A smart device with a stable internet connection
- A keen interest in this subject
- And being over the age of 16.
Career Path
Utilise this all-inclusive course to acquire the skills and expertise you’ll need to thrive in the workplace.
Course Curriculum
FUNDAMENTALS OF NETWORKING | |||
Network Topologies | 00:06:00 | ||
History and Applications of Computer Networking | 00:06:00 | ||
Protocols and Standards | 00:04:00 | ||
Introduction to OSI Model | 00:04:00 | ||
Layers of OSI Model | 00:07:00 | ||
Introduction to TCP/IP Model | 00:10:00 | ||
OSI Model vs TCP/IP Model | 00:04:00 | ||
Addressing in Computer Networks | 00:09:00 | ||
IP Address- IPv4 and IPv6 | 00:07:00 | ||
Classes of IP Address | 00:10:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS | 00:03:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS5 | 00:05:00 | ||
The Internet Protocol (IP) | 00:07:00 | ||
Address Resolution Protocol (ARP) | 00:09:00 | ||
Dynamic Host Configuration Protocol (DHCP) | 00:08:00 | ||
Internet Control Message Protocol (ICMP) | 00:06:00 | ||
RIP and OSPF Protocols | 00:05:00 | ||
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT | 00:03:00 | ||
What are Sockets? | 00:05:00 | ||
File Transfer Protocol (FTP) | 00:03:00 | ||
Hypertext Transfer Protocol (HTTP) | 00:04:00 | ||
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS) | 00:05:00 | ||
Domain Name System (DNS) | 00:03:00 | ||
GETTING STARTED WITH CYBER SECURITY | |||
Definition of Computer Security | 00:03:00 | ||
Interesting Facts about Cyber Security | 00:05:00 | ||
History of Cyber Security | 00:07:00 | ||
Scope and Career Insights in Cyber Security | 00:08:00 | ||
LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY | |||
Introduction | 00:01:00 | ||
Types of Computer Security | 00:03:00 | ||
Key Terms in Cyber Security | 00:07:00 | ||
The Elements of Information Security | 00:06:00 | ||
Types of Attacks | 00:10:00 | ||
Roles in Cyber Security : Part 1 | 00:08:00 | ||
Roles in Cyber Security : Part 2 | 00:06:00 | ||
DIVING DEEP INTO CYBER SECURITY | |||
Security Architect’s View of Security | 00:08:00 | ||
What is Vulnerability Assessment? | 00:05:00 | ||
4 Phases of Vulnerability Assessment | 00:09:00 | ||
Introduction to Cryptography | 00:06:00 | ||
Symmetric Encryption | 00:03:00 | ||
Asymmetric Encryption | 00:04:00 | ||
Hashing | 00:07:00 | ||
Security Organizations | 00:05:00 | ||
Critical Thinking in Cyber Security | 00:04:00 | ||
The Five Critical Thinking Skills | 00:06:00 | ||
PRACTICAL : USING NSLOOKUP TOOL | 00:03:00 | ||
TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES | |||
Different types of Actors in Cyber Security | 00:10:00 | ||
Types of Cyber Attacks | 00:04:00 | ||
Hacking Organizations around the Globe | 00:05:00 | ||
Security Services and Mechanisms | 00:03:00 | ||
Introduction to Threats | 00:03:00 | ||
What is a Malware? | 00:07:00 | ||
Types of Trojans | 00:06:00 | ||
Types of Virus | 00:07:00 | ||
Have you ever heard about a Ransomware? | 00:09:00 | ||
The Cyber Kill Chain | 00:09:00 | ||
Introduction to Social Engineering | 00:05:00 | ||
Types of Social Engineering | 00:07:00 | ||
KEY SECURITY CONCEPTS | |||
Confidentiality – The Most Important Element of Security | 00:04:00 | ||
Introduction to Incident Response Team | 00:05:00 | ||
Phases of Incident Response | 00:05:00 | ||
Laws in Cyber Security | 00:05:00 | ||
What are Audits in Cyber Security | 00:04:00 | ||
Internal Audit vs External Audit | 00:04:00 | ||
The NIST Framework | 00:03:00 | ||
The COBIT Framework | 00:04:00 | ||
FIREWALLS AND ANTIVIRUS | |||
Intrusion Detection System | 00:05:00 | ||
Introduction to Firewalls | 00:05:00 | ||
What is DMZ? | 00:04:00 | ||
Different types of Firewalls | 00:09:00 | ||
Assignment | |||
Assignment – Cyber Security | Unlimited | ||
Order Your Certificate | |||
Order Your Certificate QLS | 00:00:00 |
Certificate of Achievement
CPD Accredited Certification
Certification is available –
- In PDF for £2.99
- Hard copy for £8.99
£424.00£29.99- 1 year
- Level 5
- Number of Units71
- Number of Quizzes0
- 2 weeks, 5 days
Navigation
More courses for you
No related courses found