Cyber Security - Course
IT Certify
Work in Cyber Security | 12 x Cyber Security courses | CompTIA A + exams | cyber security work experience | CV build
Summary
**Cyber Security Programme Was £3,045, Now £899
Limited Special offer ends 28th February...
- Digital Certificate (included in price)
- Tutor is available to students
Add to basket or enquire
Overview
Certifications
CompTIA A+
CompTIA Network+
CompTIA Security+
Linux +
CompTIA IT Fundamentals Certification
CompTIA CySA+
ITIL V3 Foundation
MCSA: Windows 10
Cisco CCNA Collaboration Certification
Assessment details
Digital Certificate
Included in course price
Course media
Resources
- CompTIA A+ course overview Core 1 -
- CompTIA A+ course overview Core 2 - download
Description
Cyber Security course
You will gain 24 hour access to our cyber security learning portal
Cyber Security course Navigation and Controls
Our self paced cyber security training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access to your cyber security programme.
Cyber Security course Expert instructor led training
Our cyber security instructors are experts in the cyber security industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise: Cyber Security
Visual cyber security demonstrations and multimedia cyber security presentations
cyber Security content-rich presentations allow IT Certify students to develop their skills based on real-world scenarios.
Cyber Security course Quizzes and exam simulators
Custom-made practice exams reflect progress you have made throughout the IT and cyber security.
Cyber Security Flash cards and educational games
IT Certify understand every student is unique and learns at a different pace. Our Cyber Security Flashcards and Educational Games are engineered to keep you engaged and 100% focused on your cyber security training by providing a bit more fun to learning.
Apply for our cyber security programme today and you can begin your cyber security career in as little as 3 – 4 months
Below is a summary of just one of the cyber security courses included in the cyber security practical experience programme the new CompTIA Security+ SY0-601 cyber security course:
CompTIA Security+ SY0-601
Cyber Security Module 1: Information Cyber Security Roles Cyber Security Control and Framework Types
Cyber Security - Introduction and Overview
Cyber Security - Compare and Contrast Information and Cyber Security Roles
Cyber Security - Compare and Contrast Cyber Security Control and Framework Types
Cyber Security Module 1 Summary
Cyber Security Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
Cyber Security - Explain Threat Actor Types and Attack Vectors
Cyber Security - Explain Threat Intelligence Sources
Cyber Security Module 2 Summary
Cyber Security Module 3: Organisational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
Cyber Security - Access Organisational Cyber Security with Network Reconnaissance Tools
Cyber Security - Packet Capture and Replay Demo
Cyber Security - Explain Security Concerns with General Vulnerability Types
Summarize Vulnerability Scanning Techniques
Cyber Security -explain Penetration Testing Concepts
Cyber Security Module 3 Summary
Cyber Security Module 4: Social Engineering, Indicators of Malware Attacks
Cyber Security - Compare and Contrast Social Engineering Techniques
Cyber Security - Analyse Indicators of Malware-based Attacks
Cyber Security - Fork Bomb Malware Demo
Cyber Security Module 4 Summary
Cyber Security Module 5: Cryptography
Cyber Security - Compare and Contrast Cryptographic Ciphers
Cyber Security - Summarize Cryptographic Modes of Operation
Cyber Security - Summarize Cryptographic Use Cases and Weaknesses
Cyber Security - Summarize Other Cryptographic Technologies
Cyber Security Module 5 Summary
Cyber Security Module 6: Certificates and PKI
Cyber Security - Implement Certificates and Certificate Authorities
Cyber Security - Implement PKI Management
Cyber Security - Implementing a PKI Demo
Cyber Security Module Summary
Cyber Security Module 7: Authentication
Cyber Security - Summarize Authentication Design Concepts
Cyber Security - Implement Knowledge-based Authentication
Cyber Security - Password Cracker Demo
Cyber Security - Implement Authentication Technologies
Cyber Security - Summarize Biometrics Authentication Concepts
Cyber security Module Summary
Cyber Security Module 8: Identity and Accounts, Authorization, Personnel Polices
Cyber Security - Implement Identity and Account Types
Cyber Security - Implement Account Policies
Cyber Security - Account Types and Polices Demo
Cyber Security - Implement Authorization Solutions
Explain the Importance of Personnel Policies
Cyber Security Module Summary
Cyber Security Module 9: Network Design and Hardware (Part 1)
Cyber Security - Implement Secure Network Designs
Cyber Security - Implement Secure Switching and Routing
Cyber Security - Various Types of Network Attacks Demo
Cyber Security - Implement Secure Wireless Infrastructure
Cyber Security - Implement Load Balancers
Cyber Security Module Summary
Cyber Security Module 10: Network Hardware (Part 2)
Cyber Security -Implement Firewalls and Proxy Servers
Cyber Security - Implement Network Security Monitoring
Cyber Security - Summarize the Use of SIEM
Cyber security Module Summary
Cyber Security Module 11: Network Protocols
Cyber Security - Implement Secure Network Operations Protocols
Cyber Security - Implement Secure Application Protocols
Cyber Security - Implement Secure Remote Access Protocols
Cyber security Module Summary
Cyber Security Module 12: Endpoint Security
Cyber Security - Implement Secure Firmware
Cyber Security - Implement Endpoint Security
Cyber Security - Endpoint Protection Demo
Cyber Security - Explain Embedded System Security Implications
Cyber security Module Summary
Cyber Security Module 12: Endpoint Security
Cyber Security - Implement Secure Firmware
Cyber Security - Implement Endpoint Security
Cyber Security - Endpoint Protection Demo
Cyber Security - Explain Embedded System Security Implications
Cyber security Module Summary
Cyber Security Module 13: Mobile Devices
Cyber Security - Implement Mobile Device Management
Cyber Security - Implement Secure Mobile Device Connections
Cyber security Module Summary
Cyber Security Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Cyber Security - Deployment and Automation
Cyber Security - Analyze Indicators of Application Attack
Cyber Security - Analyze Indicators of Web Application Attacks
Cyber Security - Summarize Secure Coding Practices
Cyber Security - Implement Secure Script Environments
Cyber Security - Summarize Deployment and Automation Concepts
Cyber security Module Summary
Cyber Security Module 15: Secure Coding, Scripting, Deployment, Cloud, and Virtualization
Cyber Security - Summarize Secure Cloud and Virtualization Services
Cyber Security - Apply Cloud Security Solutions
Cyber Security - Summarize Infrastructure as Code Concepts
Cyber security Module Summary
Cyber Security Module 16: Privacy and Data Protection
Cyber Security -Explain Privacy and Data Sensitivity Concepts
Cyber Security - Explain Privacy and Data Protection Controls
Cyber security Module Summary
Cyber Security Module 17: Incident Response
Cyber Security - Summarize Incident Response Procedures
Cyber Security - Utilize Appropriate Data Sources for Incident Response
Cyber Security - Apply Mitigation Controls
Cyber security Module Summary
Cyber Security Module 18: Forensics
Cyber Security - Explain Key Aspects of Digital Forensics Documentation
Cyber Security - Explain Key Aspects of Digital Forensics Evidence Acquisition
Cyber security Module Summary
Cyber Security Module 19: Risk Management and Business Impact Analysis
Cyber Security - Explain Risk Management Processes and Concepts
Cyber Security - Explain Business Impact Analysis Concepts
Cyber security Module Summary
Cyber Security Module 20: Redundancy and Backup
Cyber Security - Implement Redundancy Strategies
Cyber Security Module 21:Physical Security
Cyber security Module Summary
Cyber Security Module 22: Afterword
Cyber Security Summary
Cyber security Conclusion and General Exam Tips
Who is this course for?
Cyber Security
Anyone with an interest in a career in Cyber Security with a passion to learn more about the world of Cyber Security.
Requirements
Cyber Security
No age limits and no experience needed, ideal for beginners who want to begin a career in Cyber Security
Career path
Cyber Security
Cyber Security - Information Assurance Analyst
Cyber Security - IT Business Analyst
Computer Support Specialist with cyber security
IT Security Technician
IT Support and Security Engineer
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on Reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.