Certificate In Cyber Security

£99.00

It’s now vital for any business or person to have Cyber Security. With lots of personal and sensitive information being stored such as credit card details and confidential emails, it is extremely important to keep the hackers out. In this course you will learn the fundamentals of Cyber Security and the threats that could be lurking, including types of Malware, forms of security breaches, prevention tips, various software, how to defend against hackers and much much more.

Only 6 to 8 hours of study is required.

Category:

It’s now vital for any business or person to have Cyber Security. With lots of personal and sensitive information being stored such as credit card details and confidential emails, it is extremely important to keep the hackers out. In this course you will learn the fundamentals of Cyber Security and the threats that could be lurking, including types of Malware, forms of security breaches, prevention tips, various software, how to defend against hackers and much much more.

Only 6 to 8 hours of study is required.

What’s Included?

Wiki_tick  Unlimited  lifetime access
Wiki_tick  Access anywhere, any time
Wiki_tick  Fast effective training, written and designed by industry experts
Wiki_tick  Track your progress with our Learning Management System
Wiki_tick  Unlimited support
Wiki_tick  Save money, time and travel costs
Wiki_tick  Learn at your own pace and leisure
Wiki_tick  Easier to retain knowledge and revise topics than traditional methods
Wiki_tick  Exam preparation quizzes, tests and mock exams to ensure that you are 100% ready

£99.00Add to cart

Modules

Only 6 to 8 hours of study is required.

Module One: Getting Started

Module Two: Cyber security Fundamentals

What is Cyberspace?
What is Cyber security ?
Why is Cyber security Important?
What is a Hacker?

Module Three: Types of Malware

Worms
Viruses
Spyware
Trojans

Module Four: Cyber Security Breaches

Phishing
Identity Theft
Harassment
Cyberstalking

Module Five: Types of Cyber Attacks

Password Attacks
Denial of Service Attacks
Passive Attack
Penetration Testing

Module Six: Prevention Tips

Craft a Strong Password
Two-Step Verification
Download Attachments with Care
Question Legitimacy of Websites

Module Seven: Mobile Protection

No Credit Card Numbers
Place Lock on Phone
Don’t Save Passwords
No Personalized Contacts Listed

Module Eight: Social Network Security

Don’t Reveal Location
Keep Birthdate Hidden
Have Private Profile
Don’t Link Accounts

Module Nine: Prevention Software

Firewalls
Virtual Private Networks
Anti-Virus & Anti-Spyware
Routine Updates

Module Ten: Critical Cyber Threats

Critical Cyber Threats
Cyber terrorism
Cyberwarfare
Cyberespionage

Module Eleven: Defense Against Hackers

Cryptography
Digital Forensics
Intrusion Detection
Legal Recourse

Module Twelve: Wrapping Up

System Requirements

Minimum specifications for the computer are:

Windows:

Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS:

OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)

All systems:

Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)