Cyber Security Specialist - Complete Video Course
John Academy
Summary
Overview
Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security Specialist – Complete Video Course covers a detailed and complete instruction for becoming a cybersecurity expert and also prepares you for the different exams of cyber security so that you can able to obtain a world-class certification for carrying out your job.
Any cybersecurity system starts with the task of identifying threats. In the first part of the video lesson, you will know to detect threats and learn how to respond to the threats. Then, you will learn the proper ways of securing your WLAN network. In the section Certified Information Security Manager (CISM), you will train to be a good security manager. Here, you will know how to manage, design, oversee and assess an enterprise’s information security. Next, you will learn the procedures of protecting data and personal information of the patients in the Healthcare Information Systems Security Practitioner (CHISSP) section. After that, the course presents the information related to IT recovery strategy if any disaster happens to your company.
Similarly, you will also learn about computer forensic incidents for investing cybercrime. You will know how to handle any incidents in the next section. Besides, the course guides you to be a security leadership officer so that you can lead the team for cybersecurity by the knowledge of risk management, encryption, and information security. Finally, the last section helps you to be a certified Security Sentinel so that you can keep your companies information safe and secure.
John Academy: A Great Place to Learn for Everyone, Forever
Expert Authors: We select authors with expertise and experience of training professionals. Our authors are industry experts, academics, authors, face-to-face trainers or online trainers; most often they have a combination of these backgrounds
Engaging Content: Our succinct, bite-sized and business-focussed course materials are designed to deliver the most effective training for you. Each course is made up of modules, manageable learning chunks of text, images, videos and tasks.
Why choose us?
- Study in a user-friendly, advanced online learning platform;
- All the study materials are available on your student portal including videos tutorials.
- One of the most successful online education platforms in the UK.
- Affordable, engaging & high-quality e-learning study materials;
- You will have unlimited access to online learning platform in 24 hours a day, 7 days a week in 12 Months.
- Efficient exam systems for the assessment and instant result;
- The UK & internationally recognised accredited qualification;
- Access to course content on mobile, tablet or desktop from anywhere anytime;
- The benefit of applying for NUS Extra Discount Card;
- 24/7 student support.
- Technical support and live chat service for your inquiries. This is very helpful for international learners.
- Excellent and flexible mentor supports our team of experienced tutors/trainers via email.
Assessment:
- At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
- Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
Certification:
- In addition to the course price there is an additional charge for certificate. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at the following price:
- Hard Copy by post - £39.00
- Soft Copy PDF via email - £24.00
CPD
Course media
Description
COURSE CURRICULUM
Overview of Wireless Communications
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Analyzing the Threat Landscape
Classify Threats and Threat Profiles
Perform Ongoing Threat Research
Demo-01
Analyzing Recon Threats to Computing and Network Environments
Implement Threat Modeling
Assess the Impact of Reconnaissance Incidents
Demo 01
Demo 02
Assess the Impact of Social Engineering
Demo 01
Demo 02
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks
Demo 01
Assess the Impact of Web Based Attacks
Demo 01
Assess the Impact of Malware
Demo 01
Assess the Impact of Hijacking and Impersonation Attacks
Assess the Impact of DoS Incidents
Demo 01
Assess the Impact of Threats to Mobile Security
Assess the Impact of Threats to Cloud Security
Analyzing Post-Attack Techniques
Assess Command and Control Techniques
Demo 01
Assess Persistence Techniques
Demo 01
Assess Lateral Movement and Pivoting Techniques
Assess Data Exfiltration Techniques
Demo 01
Assess Anti Forensics Techniques
Assess Anti-Forensics Techniques Demo 01
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments
Demo 01
Demo 02
Conduct Penetration Tests on Network Assets
Follow Up on Penetration Testing
Collecting Cyber security Intelligence
Deploy a Security Intelligence Collection and Analysis Platform
Collect Data from Network Based Intelligence Sources
Demo 01
Collect Data from Host Based Intelligence Sources
Collect Data from Host-Based Intelligence Sources – Demo 01
Collect Data from Host-Based Intelligence Sources Demo – 02
Analyzing Log Data
Use Common Tools to Analyze Logs
Demo 01
Use SIEM Tools for Analysis
Use SIEM Tools for Analysis – Demo 01
Parse Log Files with Regular Expressions
Performing Active Asset and Network Analysis
Analyze Incidents with Windows-Based Tools
Demo 01
Analyze Incidents with Linux Based Tools
Analyze Incidents with Linux-Based Tools – Demo 01
Analyze Malware
Analyze Malware – Demo 01
Analyze Indicators of Compromise
Analyze Indicators of Compromise – Demo 01
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture
Mitigate Incidents
Demo 01
Demo 02
Demo 03
Prepare for Forensic Investigation as a CSIRT
Investigating Cyber security Incidents
Apply a Forensic Investigation Plan
Securely Collect and Analyze Electronic Evidence
Demo 01
Securely Collect and Analyze Electronic Evidence – Demo 02
Follow Up on the Results of an Investigation
WLAN Security Overview
WLAN Security Overview and Data Privacy
Data Privacy Demo 01 Networking Basics
Data Privacy Demo 02 Web GUI Introduction
Data Privacy Demp 03 Security Options
Legacy Security
Legacy Security
VPNs
VPNs Demo 01 Security Association
VPNs Demo 02 MAC Spoofing
Encryption Ciphers and Methods
Encryption Ciphers and Methods
TKIP
CCMP
CCMP Demo 01 Encryption Examples
802.11 Authentication Methods
802.11 Authentication Methods
802.1X
EAP
EAP Demo 01 Certified Authority Server Credentials
Dynamic Encryption Key Generation
Dynamic Encryption Key Generation
Authentication and Key Management
RSNA Key Hierarchy
RSNA Key Hierarchy Demo 01 EAP
RSNA Key Hierarchy Demo 02 Information Elements
SOHO 802.11 Security
SOHO 802.11 Security
Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS) Demo 01 Cracking Hashes
Fast Secure Roaming
Fast Secure Roaming
PMKSA
FT Key Hierarchy (e-notes)
802.11K-2008
Wireless Security Risks
Wireless Security Risks
Authentication Attacks
Authentication Attacks Demp 01 Rogue Devices
Authentication Attacks Demo 02 Public Hotspots
Wireless LAN Security Auditing
Wireless LAN Security Auditing
Wireless Security Monitoring
Wireless Security Monitoring
Device Tracking
VPNs, Remote Access and Guest Access Services
VPNs, Remote Access and Guest Access Services
Remote Access
WLAN Security Infrastructure
WLAN Security Infrastructure
Management Protocols
Other RADIUS Solutions
Wireless Security Policies
Wireless Security Policies
Other Policies
Information Security Governance
Information Security Governance Overview
Effective Information Security Governance
Information Security Concepts and Technologies
Information Security Manager
Scope and Charter of Information Security Governance
Information Security Governance Metrics
Information Security Strategy Overview
Creating Information Security Strategy
Determining Current State Of Security
Information Security Strategy Development
Strategy Resources
Strategy Constraints
Action Plan to Implement Strategy
Information Risk Management
Risk Management Overview
Good Information Security Risk Management
Information Security Risk Management Concepts
Implementing Risk Management
Risk Assessment
Controls Countermeasures
Recovery Time Objectives
Risk Monitoring and Communication
Information Security Program Development
Development of Information Security Program
Information Security Program Objectives
Information Security Program Development Concepts
Scope and Charter of Information Security Program Development
Information Security Management Framework
Information Security Framework Components
Information Security Program Resources
Implementing an Information Security Program
Information Infrastructure and Architecture
Information Security Program
Security Program Services and Operational Activities
Information Security Incident Management
Incident Management Overview
Incident Response Procedures
Incident Management Organization
Incident Management Resources
Incident Management Objectives
Incident Management Metrics and Indicators
Current State of Incident Response Capability
Current State of Incident Response Capability
BCP DRP
Testing Response and Recovery Plans
Executing the Plan
Healthcare Information Systems Security
The Healthcare Industry
The Healthcare Regulatory Environment
Privacy and Security in Healthcare
Information Governance and Risk Management
Information Risk Assessment
Third-Party Risk Management
Disaster Recovery
Welcome to Disaster Recovery Training
Business Impact Analysis
Risk Analysis8
BCP Strategies
IT Recovery Strategies
Implementation Phase
Testing and Exercise
Maintenance and Updating
Execution Phase
Digital Forensics Examination
Introduction
Computer Forensic Incidents
Investigation Process
Disk Storage Concepts
Digital Acquisition & Analysis
Forensic Examination Protocols
Digital Evidence Protocols
CFI Theory
Digital Evidence Presentation
Computer Forensic Laboratory Protocols
Computer Forensic Processing
Digital Forensics Reporting
Specialized Artifact Recovery
Discovery and ESI
Cell Phone Forensics
USB Forensics
Incident Handling
PDA Forensics
Investigating Harassment
Incident Handling Engineer
Introduction
Threats, Vulnerabilities and Exploits
IH Preparation
Request Tracker for Incident Handling
Preliminary Response
Identification and Initial Response
Sysinternals
Containment
Eradication
Follow-up
Recovery
Virtualization Security
Malware Incident Handling
Security Leadership Officer
Security Management
Risk Management
Encryption
Information Security – Access Control Concepts
Incident Handling and Evidence
Operations Security
Knowing Network Security
Security Sentinel
Basic Security
User Awareness
Implementing Countermeasures
Certified Security Sentinel
Using the Internet at Work
Accessing the Company’s Network Through Your Assigned Computer
Accessing the Corporate Network Remotely
Social Engineering
Understanding and Manipulating our Target
Researching Our Target
Who is this course for?
Cyber Security Specialist – Complete Video Course is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Requirements
Our Cyber Security Specialist – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
Career path
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.
FAQs
Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2024. All rights reserved.