5.00
(1 Rating)

Diploma in Cyber Security complete course – Understand threats and prevent attacks.

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The risks that cyber threats pose are more common now that we have become almost fully reliant on online technologies.

 

This diploma course explains how such threats exploit cyber security flaws to cause financial loss, sensitive data breaches and threats to national security.

 

We discuss the many safeguards and technologies used to protect computer servers, mobile devices, cloud services and data. Sign up to master information security.

 

In This Free Course, You Will Learn How To

  • Discuss the basics of cyber security and their relevance in the Digital Age
  • Identify and mitigate various cyber threats and attack vectors
  • Explain how to ‘harden’ operating systems and manage user accounts for enhanced system security
  • Summarise conduct vulnerability assessments and apply patch management effectively
  • Outline secure cloud environments and protect data during migration
  • Explain how to implement network security measures like firewalls and VPNs
  • Explain the role of the Internet of Things (IoT) in today’s world
  • Identify common types of IoT devices and their vulnerabilities
  • Discuss the legal and ethical considerations relevant to cyber security practices
  • Explain how to use cryptographic techniques to secure communications
  • Describe web application security frameworks and secure coding principles
  • Discuss the implementation of mobile security measures and explain how to develop secure mobile apps
Show More

What Will You Learn?

  • Discuss the basics of cyber security and their relevance in the Digital Age
  • Identify and mitigate various cyber threats and attack vectors
  • Explain how to ‘harden’ operating systems and manage user accounts for enhanced system security
  • Summarise conduct vulnerability assessments and apply patch management effectively
  • Outline secure cloud environments and protect data during migration
  • Explain how to implement network security measures like firewalls and VPNs
  • Explain the role of the Internet of Things (IoT) in today's world
  • Identify common types of IoT devices and their vulnerabilities
  • Discuss the legal and ethical considerations relevant to cyber security practices
  • Explain how to use cryptographic techniques to secure communications
  • Describe web application security frameworks and secure coding principles
  • Discuss the implementation of mobile security measures and explain how to develop secure mobile apps

Course Content

MODULE 1: INTRODUCTION TO CYBERSECURITY ( Understanding Cyber Threats )

  • Learning Outcomes
    00:00
  • Getting Started with cyber security
    00:55
  • Cyber Security Fundamentals
    02:52
  • Case Study | Cyber Security Fundamentals
    00:00
  • Cyber security case study: Disastrous Business Trip to South America
    00:00
  • Readings on Cybersecurity Fundamentals
    00:00
  • Understanding Cybersecurity threats quiz 1
  • Types of Malware
    00:00
  • Case Study | Types of Malware
    00:00
  • Cyber Security Breaches
    00:00
  • Case Study | Cyber Security Breaches 2
    00:00
  • Case Study | Cyber Security Breaches 3 Stolen Hospital Laptop Causes Problems
    00:00
  • More Readings on Malware & Security Breaches
    00:00
  • Understanding Cybersecurity threats quiz 2
  • Types of Cyber Attacks
    00:00
  • Case Study | Types of Cyber Attacks
    00:00
  • Capital One Corporation Data Breach. Case study
    00:00
  • Readings on Malware and Cyberattacks
    00:00
  • Words from the Wise | Cyber Attacks
    00:00
  • Understanding Cybersecurity threats quiz 3
  • Module Summary
    00:00

MODULE 2. SECURITY MEASURES TO PREVENT CYBER ATTACKS

MODULE 3. FIRST MAIN COURSE ASSESSMENTS

MODULE 4: ADVANCED CYBER SECURITY ( NETWORK AND SYSTEM SECURITY )

MODULE 5. WEB APPLICATION SECURITY

MODULE 6. INCIDENT RESPONSE AND FORENSICS

Student Ratings & Reviews

No Review Yet
No Review Yet
Scroll to Top