IT and Cyber Security Diploma

Provided by

About the course

IT and Cyber Security Diploma
 
The knowledge of IT is a must for today’s world, no matter whether you are involved with business or not. The IT and Cyber Security Diploma course covers a general overview of IT field along with the security system.
 
The course is split into two sections: One deals with IT concepts whereas the other part deals with Cybersecurity system. In the IT part, you will learn the fundamental concepts of computer and malware. Then you will know about internet security basics, analysing attacks and post attacks, responding to cybersecurity incidents and more.
 
Entry Requirements:
  • This course is available to all learners, of all academic backgrounds.
  • Learners should be aged 16 or over to undertake the qualification.
  • Good understanding of English language, numeracy and ICT are required to attend this course.
Assessment:  
  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
  • Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam.
Certification:
  • After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24.
  • PDF certificate’s turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days.
Why choose us?
  • Affordable, engaging & high-quality e-learning study materials;
  • Tutorial videos/materials from the industry leading experts;
  • Study in a user-friendly, advanced online learning platform;
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognized accredited qualification;
  • Access to course content on mobile, tablet or desktop from anywhere anytime;
  • The benefit of career advancement opportunities;
  • 24/7 student support via email.
Career Path
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
 
  • Computer Fundamentals
  • Basic Computer Terms
  • Advanced Terms
  • Networking Basics
  • Basic Internet Concepts
  • Internet Security
  • Computers in the Workplace
  • Tele-Commuting
  • The Electronic World
  • Ergonomics
  • Safety and the Environment
  • Being Proactive
  • Identifying Yourself
  • Protecting Your Data
  • Understanding Malware
  • Protecting Against Malware
  • Malware Protection
  • Why You Need To Worry About “Malware”
  • Viruses
  • Spyware/Adware
  • Safety & Security at the Browser Level
  • Spyware Can Destroy
  • How Does Spyware Spread?
  • How To Remove Spyware
  • Anti Spyware Program
  • The Anti Anti-Spyware Programs
  • Research And Learn More
  • Choosing The Best Anti Spyware Tool
  • Computer Security And Spyware
  • The Programs To Avoid
  • Is It Legal?
  • Checklist Of Protection
  • Glossary of Terms
  • Cyber Security Basics
  • Introduction
  • Child Safety Online
  • Secure Payment Sites
  • Online Banking
  • How To Keep Your Password Safe
  • Common Scams
  • How I Got Pharmed
  • Virus Protection
  • Self Maintenance
  • Personal Information Online
  • Is The Internet Safe?
  • Importance of Cyber Security
  • Internet Security Management
  • Internet Security- The Truth About Identify Theft
  • Internet Security for Teens- What You Need to Do
  • Internet Security-Downloading Email Attachments
  • Internet Security- 5 Tips for Using Facebook
  • Internet Security- 8 Tips to Protect Yourself When Dating Online
  • Internet Security for Teens and Tweens- 10 Tips to Keep You Protected
  • Internet Security- Parental Control Software
  • Internet Security- Online Safety for Your Children
  • Cyber Bullying- Another Aspect of Breaking Internet Security
  • Tips to Ensure Internet Security
  • Internet Security- Downloading Music off the Internet
  • Internet Security- Protect Your Wireless Connection
  • Internet Security- How to Deal with Spyware
  • Internet Security- Protecting Yourself When You Shop Online
  • Internet Security- Storing Your Password on Your Computer
  • Make Sure Your Emails Are Safe: Tips for Internet Security
  • Internet Security- Why Should You Use a Firewall?
  • Internet security-Signs That Your Child’s Safety Might Be Compromised
  • Internet Security- Safety When Using Public Computers
  • Internet Security- Storing Your Password on Your Computer
  • Internet Security-Using Social Utility Sites
  • IT Security
  • Spyware Can Destroy
  • How Does Spyware Spread?
  • How To Remove Spyware
  • Anti Spyware Program
  • The Anti Anti-Spyware Programs
  • Research And Learn More
  • Choosing The Best Anti Spyware Tool
  • Computer Security And Spyware
  • The Programs To Avoid
  • Is It Legal?
  • Checklist Of Protection
  • Overview of Wireless Communications
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing
  • Analyzing Attacks on Computing and Network Environments
  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security
  • Analyzing Post-Attack Techniques
  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics
  • Evaluating the Organization’s Security Posture
  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files
  • Analyzing Log Data
  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions
  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux-Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise
  • Analyzing Indicators of Compromise
  • Responding to Cyber security Incidents
  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT
  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation
  • Mock Exam
  • Mock Exam- IT and Cyber Security Diploma
  • Final Exam
  • Final Exam- IT and Cyber Security Diploma

Related article

CYBER PULSE: EDITION 131 | 28 SEPTEMBER 2020 Read the latest edition of Cyber Pulse: Major KuCoin cryptocurrency theft, Hungarian financial