Skip to content

IT Communications Level 3 + Cyber Security Diploma Level 3 (Only £27)

FREE PDF Certificate | Assessment Included | Tutor Support | 1 Year Access


Janets

Summary

Price
£319 inc VAT
Or £53.17/mo. for 6 months...
Study method
Online
Duration
28 hours · Self-paced
Access to content
1 year
Qualification
No formal qualification
Certificates
  • Certificate of completion - Free
Additional info
  • Tutor is available to students

Overview

*** Instant 10% Off ! Use Coupon: " LOVEMONDAYS " On Checkout ***

Improve your skills in IT Communications and Cyber Security at the same time with two essential IT courses for the price of one.

The IT Communications Level 3 course teaches you the basic concepts of IT communication, and you will explore how to function in a wide range of areas within the ICT industry. The course also shows you the ICT support roles for a business company. Other topics covered in the course are local and wide area networks, voice network and wireless data network installation and maintenance, key operational and technical aspects of computer communication systems and relevant security issues, and more.

Maintains Cyber security has become a mandatory task for any organisation that embraces IT in their company because of the rise of malicious hackers. The Cyber Security Diploma Level 3 course teaches you how to secure your company’s information and know how to handle an unwanted situation. Child safety online, securing payment sites, securing online banking, keeping password safe, common scams, etc. will be discussed in the course.

The award-winning IT Communications Level 3 and Cyber Security Diploma Level 3 are our most popular online courses for anyone looking to start a career or gain skills in relevant industry. The IT Communications Level 3 and Cyber Security Diploma Level 3 are taught entirely online by expert instructors. Modules are delivered through accessible, informative video lessons, online study materials, practical exercises, mock exams and multiple-choice assessments.

More key features of the courses:

  • Earn free e-certificates upon successful completion of each course.
  • Accessible, informative modules taught by expert instructors
  • Study in your own time, at your own pace, through your computer tablet or mobile device
  • Benefit from instant feedback through mock exams and multiple-choice assessments
  • Get 24/7 help or advice from our email and live chat teams

Course media

Description

Course Curriculum

*IT Communications Level 3*

Module 1: Basics of Data Communications

  • Basics of the Information Technology
  • INTRODUCTION
  • OBJECTIVES
  • DATA COMMUNICATION
  • COMMUNICATION MEDIA
  • TYPES OF COMMUNICATION SERVICES
  • MODEM
  • COMPUTER NETWORK
  • BENEFITS OF NETWORK
  • TYPES OF NETWORK
  • IMPORTANT TERMS USED IN NETWORKING
  • TELECONFERENCING

Module 2: Computer Networking Basics

  • Introduction to Computer Networking
  • Types of Computer Networks
  • Types of Network Equipment
  • Ethernet
  • Wireless Local Area Networking
  • Internet Service
  • TCP/IP and Other Internet Protocols
  • Network Routing, Switching and Bridging
  • IPv4 & IPv6

Module 3: Networking

  • Basics of Computer Networking
  • Computer Networking Design and Solutions
  • Getting the Right Computer Network Hardware
  • Setting Up Your Computer Network
  • Wireless vs Wired
  • Cable Management for Wired Computer Network
  • Managing Your Network With Network Monitoring Tools
  • Computer Network Maintenance and Repair
  • Troubleshooting Computer Network Wrapping Up

*Cyber Security Diploma Level 3*

Cyber Security Basics

  • Introduction
  • Child Safety Online
  • Secure Payment Sites
  • Online Banking
  • How To Keep Your Password Safe
  • Common Scams
  • How I Got Pharmed
  • Virus Protection
  • Self Maintenance
  • Personal Information Online
  • Is The Internet Safe?
  • Importance of Cyber Security

Threat Detection and Response

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing
  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security
  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics
  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files
  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions
  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise – Part 1
  • Analyze Indicators of Compromise – Part 2
  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT
  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation
  • Checklist Of Protection

Internet Security Management

  • Internet Security- The Truth About Identify Theft
  • Internet Security for Teens- What You Need to Do
  • Internet Security-Downloading Email Attachments
  • Internet Security- 5 Tips for Using Facebook
  • Internet Security- 8 Tips to Protect Yourself When Dating Online
  • Internet Security for Teens and Tweens- 10 Tips to Keep You Protected
  • Internet Security- Parental Control Software
  • Internet Security- Online Safety for Your Children
  • Cyber Bullying- Another Aspect of Breaking Internet Security
  • Tips to Ensure Internet Security
  • Internet Security- Downloading Music off the Internet
  • Internet Security- Protect Your Wireless Connection
  • Internet Security- How to Deal with Spyware
  • Internet Security- Protecting Yourself When You Shop Online
  • Internet Security- Make Sure Your Passwords Protect You
  • Make Sure Your Emails Are Safe: Tips for Internet Security
  • Internet Security- Why Should You Use a Firewall?
  • Internet security-Signs That Your Child’s Safety Might Be Compromised
  • Internet Security- Safety When Using Public Computers
  • Internet Security- Storing Your Password on Your Computer
  • Internet Security-Using Social Utility Sites

IT Security

  • Spyware Can Destroy
  • How Does Spyware Spread?
  • How To Remove Spyware
  • Anti Spyware Program
  • The Anti Anti-Spyware Programs
  • Research And Learn More
  • Choosing The Best Anti-Spyware Tool
  • Computer Security And Spyware
  • The Programs To Avoid
  • Is It Legal?

Certification

Upon successful completion of the course, you will be able to obtain your course completion PDF certificate free of cost. Print copy by post is also available at an additional cost of £9.99

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Certificate of completion

Digital certificate - Included

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.