Cyber Security - Course
Work in Cyber Security | 12 x Cyber Security courses | CompTIA A + exams | cyber security work experience | CV build
IT Certify
Summary
**Cyber Security Programme Was £3,045, Now £899
Limited Special offer ends 31st January...
- Exam(s) / assessment(s) is included in price
- Tutor is available to students
Add to basket or enquire
Overview
Cyber Security
The Cyber Security Job Programme has been part-funded by IT Certify to meet the growing demands of cyber security employers that urgently need to recruit Cyber Security employees. The Cyber Security Practical Experience Programme supports your complete transition into a cyber security role so that you can begin your career in cyber security.
The Cyber Security Practical Experience Programme is split into two parts to save on your access time for the cyber security programme. We release the IT Support course onto your learning portal straight away with 12 months access. Once these are finished we then release the Cyber Security courses onto your portal so that we can add these on with a fresh 12 months access thus extending your access time.
Get a job in Cyber Security with the NEW Fast Track Cyber Security Practical Experience Programme for beginners looking to get into Cyber Security
- 11 essential Cyber Security courses worth £2189
- Cyber Security Practical Experience with two Live Practise Labs worth £198 (CompTIA A+ and Cyber Security specific CompTIA Security +)
- Professional CV Consultation worth £149 for your Cyber Security Career
- CompTIA A+ Exam included (Both parts) worth £310
- Now updated with the Fast Track access allowing you to apply for entry level cyber security jobs in just 3-4 months.
Cyber Security Programme STEP 1: Study 11 x essential Cyber Security courses worth £2189 broken into two parts:
Part 1 - IT Support
- CompTIA IT Fundamentals
- CompTIA A+
- CompTIA Network +
- CompTIA Cloud +
- Windows 10
- Information Technology Infrastructure ITIL Foundations
- Cisco CCENT
Part 2 - Cyber Security
- CompTIA Security +
- CompTIA Linux +
- CompTIA CySA + (Cyber Security Analyst)
- CCKK Cloud Computing Security Knowledge
- Ethical Hacker (added free of charge not compulsory)
Cyber Security Programme Step 2: Use your Unlimited Mock Test Support for the CompTIA A+ exam Before we put you forward for the CompTIA A+ exams we will support you all the way with unlimited Mock Test Support. This means that it doesn’t matter whether you need 3 Mock Tests or 10 Mock Tests, however many you need we will provide these to you until your hitting our 85% pass rate twice. This means before you take the A+ exam you know you will pass first time (pass rate needed 75% for CompTIA A+ Core 1 and 78% for CompTIA A+ Core 2)
Get the best of both worlds with a Mock Test Teacher and an Account Manager - Cyber Security
Dedicated Mock Test Teacher
Your Mock Test teacher will provide you with personalised feedback and support you with any questions you have
Dedicated Account Manager
You will also have a dedicated account manager to answer any queries you may have
Cyber Security Programme Step 3: Pass the CompTIA A + Exam - The CompTIA A + exam (exam cost is included) is in two parts and will be taken online. You will need to achieve 75% and 78% in the real exams to pass. Our Mock Tests require 85% (twice) so once you pass these you know you are ready.
Cyber Security Programme Step 4: Cyber Security Practical Experience -Begin your practical experience by completing the Practise Lab for the CompTIA A + Core 2 and CompTIA Security +. Here you will have access to real live equipment where you will be troubleshooting real world issues with Network connections, switches, routers and work stations for example. These will be identical to issues you will be in charge of fixing when you work in an IT Support role with entry level cyber security.
Cyber Security Programme Step 4: Professional CV consultation - Here we will go through all of the new cyber security skills you have gained through the cyber security courses and cyber security practical experience. We will also add all of the transferable skills that you didn't even know you possessed that relate to cyber security. We will also ensure that your new cyber security CV is ATS proof meaning that it won't get automatically rejected by all of the bots that jobs sites use. Due to the ease of candidates being able to apply for jobs now (you can do 30 applications just ticking some boxes) employers use an ATS robot which automatically scan through CV's and send an automated rejection letter if the CV received doesn't contain enough "points". We will ensure your new cyber security CV contains enough of these "points" so that you can start getting your interviews in Cyber Security.
Cyber Security Programme Step 5: Start applying for jobs in Cyber Security: You are in high demand at this stage. You are certified, skilled and have practical experience and your new CV is getting through and landing you interviews in cyber security. At this stage candidates get interviews within just 1 to 3 weeks and receive job offers within 4 to 6 weeks with salaries of between £28,000 to £35,000
Certifications
CompTIA A+
CompTIA Network+
CompTIA Security+
Linux +
CompTIA IT Fundamentals Certification
CompTIA CySA+
ITIL V3 Foundation
MCSA: Windows 10
Cisco CCNA Collaboration Certification
Course media
Resources
- CompTIA A+ course overview Core 1 -
- CompTIA A+ course overview Core 2 - download
Description
Cyber Security course
You will gain 24 hour access to our cyber security learning portal
Cyber Security course Navigation and Controls
Our self paced cyber security training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access to your cyber security programme.
Cyber Security course Expert instructor led training
Our cyber security instructors are experts in the cyber security industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise: Cyber Security
Visual cyber security demonstrations and multimedia cyber security presentations
cyber Security content-rich presentations allow IT Certify students to develop their skills based on real-world scenarios.
Cyber Security course Quizzes and exam simulators
Custom-made practice exams reflect progress you have made throughout the IT and cyber security.
Cyber Security Flash cards and educational games
IT Certify understand every student is unique and learns at a different pace. Our Cyber Security Flashcards and Educational Games are engineered to keep you engaged and 100% focused on your cyber security training by providing a bit more fun to learning.
Apply for our cyber security programme today and you can begin your cyber security career in as little as 3 – 4 months
Below is a summary of just one of the cyber security courses included in the cyber security practical experience programme the new CompTIA Security+ SY0-601 cyber security course:
CompTIA Security+ SY0-601
Cyber Security Module 1: Information Cyber Security Roles Cyber Security Control and Framework Types
Cyber Security - Introduction and Overview
Cyber Security - Compare and Contrast Information and Cyber Security Roles
Cyber Security - Compare and Contrast Cyber Security Control and Framework Types
Cyber Security Module 1 Summary
Cyber Security Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
Cyber Security - Explain Threat Actor Types and Attack Vectors
Cyber Security - Explain Threat Intelligence Sources
Cyber Security Module 2 Summary
Cyber Security Module 3: Organisational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
Cyber Security - Access Organisational Cyber Security with Network Reconnaissance Tools
Cyber Security - Packet Capture and Replay Demo
Cyber Security - Explain Security Concerns with General Vulnerability Types
Summarize Vulnerability Scanning Techniques
Cyber Security -explain Penetration Testing Concepts
Cyber Security Module 3 Summary
Cyber Security Module 4: Social Engineering, Indicators of Malware Attacks
Cyber Security - Compare and Contrast Social Engineering Techniques
Cyber Security - Analyse Indicators of Malware-based Attacks
Cyber Security - Fork Bomb Malware Demo
Cyber Security Module 4 Summary
Cyber Security Module 5: Cryptography
Cyber Security - Compare and Contrast Cryptographic Ciphers
Cyber Security - Summarize Cryptographic Modes of Operation
Cyber Security - Summarize Cryptographic Use Cases and Weaknesses
Cyber Security - Summarize Other Cryptographic Technologies
Cyber Security Module 5 Summary
Cyber Security Module 6: Certificates and PKI
Cyber Security - Implement Certificates and Certificate Authorities
Cyber Security - Implement PKI Management
Cyber Security - Implementing a PKI Demo
Cyber Security Module Summary
Cyber Security Module 7: Authentication
Cyber Security - Summarize Authentication Design Concepts
Cyber Security - Implement Knowledge-based Authentication
Cyber Security - Password Cracker Demo
Cyber Security - Implement Authentication Technologies
Cyber Security - Summarize Biometrics Authentication Concepts
Cyber security Module Summary
Cyber Security Module 8: Identity and Accounts, Authorization, Personnel Polices
Cyber Security - Implement Identity and Account Types
Cyber Security - Implement Account Policies
Cyber Security - Account Types and Polices Demo
Cyber Security - Implement Authorization Solutions
Explain the Importance of Personnel Policies
Cyber Security Module Summary
Cyber Security Module 9: Network Design and Hardware (Part 1)
Cyber Security - Implement Secure Network Designs
Cyber Security - Implement Secure Switching and Routing
Cyber Security - Various Types of Network Attacks Demo
Cyber Security - Implement Secure Wireless Infrastructure
Cyber Security - Implement Load Balancers
Cyber Security Module Summary
Cyber Security Module 10: Network Hardware (Part 2)
Cyber Security -Implement Firewalls and Proxy Servers
Cyber Security - Implement Network Security Monitoring
Cyber Security - Summarize the Use of SIEM
Cyber security Module Summary
Cyber Security Module 11: Network Protocols
Cyber Security - Implement Secure Network Operations Protocols
Cyber Security - Implement Secure Application Protocols
Cyber Security - Implement Secure Remote Access Protocols
Cyber security Module Summary
Cyber Security Module 12: Endpoint Security
Cyber Security - Implement Secure Firmware
Cyber Security - Implement Endpoint Security
Cyber Security - Endpoint Protection Demo
Cyber Security - Explain Embedded System Security Implications
Cyber security Module Summary
Cyber Security Module 12: Endpoint Security
Cyber Security - Implement Secure Firmware
Cyber Security - Implement Endpoint Security
Cyber Security - Endpoint Protection Demo
Cyber Security - Explain Embedded System Security Implications
Cyber security Module Summary
Cyber Security Module 13: Mobile Devices
Cyber Security - Implement Mobile Device Management
Cyber Security - Implement Secure Mobile Device Connections
Cyber security Module Summary
Cyber Security Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Cyber Security - Deployment and Automation
Cyber Security - Analyze Indicators of Application Attack
Cyber Security - Analyze Indicators of Web Application Attacks
Cyber Security - Summarize Secure Coding Practices
Cyber Security - Implement Secure Script Environments
Cyber Security - Summarize Deployment and Automation Concepts
Cyber security Module Summary
Cyber Security Module 15: Secure Coding, Scripting, Deployment, Cloud, and Virtualization
Cyber Security - Summarize Secure Cloud and Virtualization Services
Cyber Security - Apply Cloud Security Solutions
Cyber Security - Summarize Infrastructure as Code Concepts
Cyber security Module Summary
Cyber Security Module 16: Privacy and Data Protection
Cyber Security -Explain Privacy and Data Sensitivity Concepts
Cyber Security - Explain Privacy and Data Protection Controls
Cyber security Module Summary
Cyber Security Module 17: Incident Response
Cyber Security - Summarize Incident Response Procedures
Cyber Security - Utilize Appropriate Data Sources for Incident Response
Cyber Security - Apply Mitigation Controls
Cyber security Module Summary
Cyber Security Module 18: Forensics
Cyber Security - Explain Key Aspects of Digital Forensics Documentation
Cyber Security - Explain Key Aspects of Digital Forensics Evidence Acquisition
Cyber security Module Summary
Cyber Security Module 19: Risk Management and Business Impact Analysis
Cyber Security - Explain Risk Management Processes and Concepts
Cyber Security - Explain Business Impact Analysis Concepts
Cyber security Module Summary
Cyber Security Module 20: Redundancy and Backup
Cyber Security - Implement Redundancy Strategies
Cyber Security Module 21:Physical Security
Cyber security Module Summary
Cyber Security Module 22: Afterword
Cyber Security Summary
Cyber security Conclusion and General Exam Tips
Who is this course for?
Cyber Security
Anyone with an interest in a career in Cyber Security with a passion to learn more about the world of Cyber Security.
Requirements
Cyber Security
No age limits and no experience needed, ideal for beginners who want to begin a career in Cyber Security
Career path
Cyber Security
Cyber Security - Information Assurance Analyst
Cyber Security - IT Business Analyst
Computer Support Specialist with cyber security
IT Security Technician
IT Support and Security Engineer
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on Reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.