Learn about IT security from industry experts and boost your professional skill. This IT security course will enhance your skill and make you ready for the job market. You’ll get expert opinions about the best practices and problems of IT security. You’ll also gain the skills of IT security to excel in your job and tips to master professional skills in no time.
You’ll be connected with the community of IT security professionals and gain first-hand experience of IT security problem-solving. The IT security is self-paced. You can complete your course and attend the examination in your suitable schedule. After completing the IT security, you’ll be provided with a CPD accredited certificate which will boost your CV and help you get your dream job.
This IT security will provide you with the latest information and updates of IT security. It will keep you one step ahead of others and increase your chances of growth.
After studying the course materials of the IT security you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.
This IT security does not require you to have any prior qualifications or experience. You can just enrol and start learning.
This IT security was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This IT security is a great way for you to gain multiple skills from the comfort of your home.
FUNDAMENTALS OF NETWORKING | |||
Network Topologies | 00:06:00 | ||
History and Applications of Computer Networking | 00:06:00 | ||
Protocols and Standards | 00:04:00 | ||
Introduction to OSI Model | 00:04:00 | ||
Layers of OSI Model | 00:07:00 | ||
Introduction to TCP/IP Model | 00:10:00 | ||
OSI Model vs TCP/IP Model | 00:04:00 | ||
Addressing in Computer Networks | 00:09:00 | ||
IP Address- IPv4 and IPv6 | 00:07:00 | ||
Classes of IP Address | 00:10:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS | 00:03:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS | 00:05:00 | ||
The Internet Protocol (IP) | 00:07:00 | ||
Address Resolution Protocol (ARP) | 00:09:00 | ||
Dynamic Host Configuration Protocol (DHCP) | 00:08:00 | ||
Internet Control Message Protocol (ICMP) | 00:06:00 | ||
RIP and OSPF Protocols | 00:06:00 | ||
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT | 00:03:00 | ||
What are Sockets? | 00:05:00 | ||
File Transfer Protocol (FTP) | 00:03:00 | ||
Hypertext Transfer Protocol (HTTP) | 00:04:00 | ||
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS) | 00:05:00 | ||
Domain Name System (DNS) | 00:03:00 | ||
GETTING STARTED WITH CYBER SECURITY | |||
Definition of Computer Security | 00:03:00 | ||
Interesting Facts about Cyber Security | 00:05:00 | ||
History of Cyber Security | 00:07:00 | ||
Scope and Career Insights in Cyber Security | 00:08:00 | ||
LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY | |||
Introduction | 00:01:00 | ||
Types of Computer Security | 00:03:00 | ||
Key Terms in Cyber Security | 00:07:00 | ||
The Elements of Information Security | 00:06:00 | ||
Types of Attacks | 00:10:00 | ||
Roles in Cyber Security : Part 1 | 00:08:00 | ||
Roles in Cyber Security : Part 2 | 00:06:00 | ||
DIVING DEEP INTO CYBER SECURITY | |||
Security Architect’s View of Security | 00:08:00 | ||
What is Vulnerability Assessment? | 00:05:00 | ||
4 Phases of Vulnerability Assessment | 00:09:00 | ||
Introduction to Cryptography | 00:06:00 | ||
Symmetric Encryption | 00:03:00 | ||
Asymmetric Encryption | 00:04:00 | ||
Hashing | 00:07:00 | ||
Security Organizations | 00:04:00 | ||
Critical Thinking in Cyber Security | 00:04:00 | ||
The Five Critical Thinking Skills | 00:06:00 | ||
PRACTICAL : USING NSLOOKUP TOOL | 00:03:00 | ||
TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES | |||
Different types of Actors in Cyber Security | 00:10:00 | ||
Types of Cyber Attacks | 00:04:00 | ||
Hacking Organizations around the Globe | 00:05:00 | ||
Security Services and Mechanisms | 00:03:00 | ||
Introduction to Threats | 00:03:00 | ||
What is a Malware? | 00:07:00 | ||
Types of Trojans | 00:06:00 | ||
Types of Virus | 00:07:00 | ||
Have you ever heard about a Ransomware? | 00:09:00 | ||
The Cyber Kill Chain | 00:09:00 | ||
Introduction to Social Engineering | 00:05:00 | ||
Types of Social Engineering | 00:07:00 | ||
KEY SECURITY CONCEPTS | |||
Confidentiality – The Most Important Element of Security | 00:04:00 | ||
Introduction to Incident Response Team | 00:05:00 | ||
Phases of Incident Response | 00:05:00 | ||
Laws in Cyber Security | 00:05:00 | ||
What are Audits in Cyber Security | 00:04:00 | ||
Internal Audit vs External Audit | 00:04:00 | ||
The NIST Framework | 00:03:00 | ||
The COBIT Framework | 00:04:00 | ||
FIREWALLS AND ANTIVIRUS | |||
Intrusion Detection System | 00:05:00 | ||
Introduction to Firewalls | 00:05:00 | ||
What is DMZ? | 00:04:00 | ||
Different types of Firewalls | 00:09:00 |
Overview The Ultimate Microsoft Office Bundle course will allow you to get the very best results from every one of …
65
Overview Uplift Your Career & Skill Up to Your Dream Job – Learning Simplified From Home! Kickstart your career & …
1
Dive deep into the intricate world of Microsoft Office with a tailored course specifically designed for Arabic speakers. The “Microsoft …
1