Skip to content

Cyber Security Specialist - Complete Video Course


John Academy

Summary

Price
£350 inc VAT
Or £58.33/mo. for 6 months...
Study method
Online
Duration
71 hours · Self-paced
Qualification
No formal qualification
CPD
40 CPD hours / points

Overview

Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security Specialist – Complete Video Course covers a detailed and complete instruction for becoming a cybersecurity expert and also prepares you for the different exams of cyber security so that you can able to obtain a world-class certification for carrying out your job.

Any cybersecurity system starts with the task of identifying threats. In the first part of the video lesson, you will know to detect threats and learn how to respond to the threats. Then, you will learn the proper ways of securing your WLAN network. In the section Certified Information Security Manager (CISM), you will train to be a good security manager. Here, you will know how to manage, design, oversee and assess an enterprise’s information security. Next, you will learn the procedures of protecting data and personal information of the patients in the Healthcare Information Systems Security Practitioner (CHISSP) section. After that, the course presents the information related to IT recovery strategy if any disaster happens to your company.

Similarly, you will also learn about computer forensic incidents for investing cybercrime. You will know how to handle any incidents in the next section. Besides, the course guides you to be a security leadership officer so that you can lead the team for cybersecurity by the knowledge of risk management, encryption, and information security. Finally, the last section helps you to be a certified Security Sentinel so that you can keep your companies information safe and secure.

John Academy: A Great Place to Learn for Everyone, Forever

Expert Authors: We select authors with expertise and experience of training professionals. Our authors are industry experts, academics, authors, face-to-face trainers or online trainers; most often they have a combination of these backgrounds

Engaging Content: Our succinct, bite-sized and business-focussed course materials are designed to deliver the most effective training for you. Each course is made up of modules, manageable learning chunks of text, images, videos and tasks.

Why choose us?

  • Study in a user-friendly, advanced online learning platform;
  • All the study materials are available on your student portal including videos tutorials.
  • One of the most successful online education platforms in the UK.
  • Affordable, engaging & high-quality e-learning study materials;
  • You will have unlimited access to online learning platform in 24 hours a day, 7 days a week in 12 Months.
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognised accredited qualification;
  • Access to course content on mobile, tablet or desktop from anywhere anytime;
  • The benefit of applying for NUS Extra Discount Card;
  • 24/7 student support.
  • Technical support and live chat service for your inquiries. This is very helpful for international learners.
  • Excellent and flexible mentor supports our team of experienced tutors/trainers via email.

Assessment:

  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:

  • In addition to the course price there is an additional charge for certificate. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at the following price:
  • Hard Copy by post - £39.00
  • Soft Copy PDF via email - £24.00

CPD

40 CPD hours / points
Accredited by CPD QS

Course media

Description

COURSE CURRICULUM

Overview of Wireless Communications

Identify the Importance of Risk Management

Assess Risk

Mitigate Risk

Integrate Documentation into Risk Management

Analyzing the Threat Landscape

Classify Threats and Threat Profiles

Perform Ongoing Threat Research

Demo-01

Analyzing Recon Threats to Computing and Network Environments

Implement Threat Modeling

Assess the Impact of Reconnaissance Incidents

Demo 01

Demo 02

Assess the Impact of Social Engineering

Demo 01

Demo 02

Analyzing Attacks on Computing and Network Environments

Assess the Impact of System Hacking Attacks

Demo 01

Assess the Impact of Web Based Attacks

Demo 01

Assess the Impact of Malware

Demo 01

Assess the Impact of Hijacking and Impersonation Attacks

Assess the Impact of DoS Incidents

Demo 01

Assess the Impact of Threats to Mobile Security

Assess the Impact of Threats to Cloud Security

Analyzing Post-Attack Techniques

Assess Command and Control Techniques

Demo 01

Assess Persistence Techniques

Demo 01

Assess Lateral Movement and Pivoting Techniques

Assess Data Exfiltration Techniques

Demo 01

Assess Anti Forensics Techniques

Assess Anti-Forensics Techniques Demo 01

Evaluating the Organization’s Security Posture

Conduct Vulnerability Assessments

Demo 01

Demo 02

Conduct Penetration Tests on Network Assets

Follow Up on Penetration Testing

Collecting Cyber security Intelligence

Deploy a Security Intelligence Collection and Analysis Platform

Collect Data from Network Based Intelligence Sources

Demo 01

Collect Data from Host Based Intelligence Sources

Collect Data from Host-Based Intelligence Sources – Demo 01

Collect Data from Host-Based Intelligence Sources Demo – 02

Analyzing Log Data

Use Common Tools to Analyze Logs

Demo 01

Use SIEM Tools for Analysis

Use SIEM Tools for Analysis – Demo 01

Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

Analyze Incidents with Windows-Based Tools

Demo 01

Analyze Incidents with Linux Based Tools

Analyze Incidents with Linux-Based Tools – Demo 01

Analyze Malware

Analyze Malware – Demo 01

Analyze Indicators of Compromise

Analyze Indicators of Compromise – Demo 01

Responding to Cyber security Incidents

Deploy an Incident Handling and Response Architecture

Mitigate Incidents

Demo 01

Demo 02

Demo 03

Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

Apply a Forensic Investigation Plan

Securely Collect and Analyze Electronic Evidence

Demo 01

Securely Collect and Analyze Electronic Evidence – Demo 02

Follow Up on the Results of an Investigation

WLAN Security Overview

WLAN Security Overview and Data Privacy

Data Privacy Demo 01 Networking Basics

Data Privacy Demo 02 Web GUI Introduction

Data Privacy Demp 03 Security Options

Legacy Security

Legacy Security

VPNs

VPNs Demo 01 Security Association

VPNs Demo 02 MAC Spoofing

Encryption Ciphers and Methods

Encryption Ciphers and Methods

TKIP

CCMP

CCMP Demo 01 Encryption Examples

802.11 Authentication Methods

802.11 Authentication Methods

802.1X

EAP

EAP Demo 01 Certified Authority Server Credentials

Dynamic Encryption Key Generation

Dynamic Encryption Key Generation

Authentication and Key Management

RSNA Key Hierarchy

RSNA Key Hierarchy Demo 01 EAP

RSNA Key Hierarchy Demo 02 Information Elements

SOHO 802.11 Security

SOHO 802.11 Security

Wi-Fi Protected Setup (WPS)

Wi-Fi Protected Setup (WPS) Demo 01 Cracking Hashes

Fast Secure Roaming

Fast Secure Roaming

PMKSA

FT Key Hierarchy (e-notes)

802.11K-2008

Wireless Security Risks

Wireless Security Risks

Authentication Attacks

Authentication Attacks Demp 01 Rogue Devices

Authentication Attacks Demo 02 Public Hotspots

Wireless LAN Security Auditing

Wireless LAN Security Auditing

Wireless Security Monitoring

Wireless Security Monitoring

Device Tracking

VPNs, Remote Access and Guest Access Services

VPNs, Remote Access and Guest Access Services

Remote Access

WLAN Security Infrastructure

WLAN Security Infrastructure

Management Protocols

Other RADIUS Solutions

Wireless Security Policies

Wireless Security Policies

Other Policies

Information Security Governance

Information Security Governance Overview

Effective Information Security Governance

Information Security Concepts and Technologies

Information Security Manager

Scope and Charter of Information Security Governance

Information Security Governance Metrics

Information Security Strategy Overview

Creating Information Security Strategy

Determining Current State Of Security

Information Security Strategy Development

Strategy Resources

Strategy Constraints

Action Plan to Implement Strategy

Information Risk Management

Risk Management Overview

Good Information Security Risk Management

Information Security Risk Management Concepts

Implementing Risk Management

Risk Assessment

Controls Countermeasures

Recovery Time Objectives

Risk Monitoring and Communication

Information Security Program Development

Development of Information Security Program

Information Security Program Objectives

Information Security Program Development Concepts

Scope and Charter of Information Security Program Development

Information Security Management Framework

Information Security Framework Components

Information Security Program Resources

Implementing an Information Security Program

Information Infrastructure and Architecture

Information Security Program

Security Program Services and Operational Activities

Information Security Incident Management

Incident Management Overview

Incident Response Procedures

Incident Management Organization

Incident Management Resources

Incident Management Objectives

Incident Management Metrics and Indicators

Current State of Incident Response Capability

Current State of Incident Response Capability

BCP DRP

Testing Response and Recovery Plans

Executing the Plan

Healthcare Information Systems Security

The Healthcare Industry

The Healthcare Regulatory Environment

Privacy and Security in Healthcare

Information Governance and Risk Management

Information Risk Assessment

Third-Party Risk Management

Disaster Recovery

Welcome to Disaster Recovery Training

Business Impact Analysis

Risk Analysis8

BCP Strategies

IT Recovery Strategies

Implementation Phase

Testing and Exercise

Maintenance and Updating

Execution Phase

Digital Forensics Examination

Introduction

Computer Forensic Incidents

Investigation Process

Disk Storage Concepts

Digital Acquisition & Analysis

Forensic Examination Protocols

Digital Evidence Protocols

CFI Theory

Digital Evidence Presentation

Computer Forensic Laboratory Protocols

Computer Forensic Processing

Digital Forensics Reporting

Specialized Artifact Recovery

Discovery and ESI

Cell Phone Forensics

USB Forensics

Incident Handling

PDA Forensics

Investigating Harassment

Incident Handling Engineer

Introduction

Threats, Vulnerabilities and Exploits

IH Preparation

Request Tracker for Incident Handling

Preliminary Response

Identification and Initial Response

Sysinternals

Containment

Eradication

Follow-up

Recovery

Virtualization Security

Malware Incident Handling

Security Leadership Officer

Security Management

Risk Management

Encryption

Information Security – Access Control Concepts

Incident Handling and Evidence

Operations Security

Knowing Network Security

Security Sentinel

Basic Security

User Awareness

Implementing Countermeasures

Certified Security Sentinel

Using the Internet at Work

Accessing the Company’s Network Through Your Assigned Computer

Accessing the Corporate Network Remotely

Social Engineering

Understanding and Manipulating our Target

Researching Our Target

Who is this course for?

Cyber Security Specialist – Complete Video Course is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Requirements

Our Cyber Security Specialist – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2024. All rights reserved.