Cyber Security Specialist - Complete Video Course

Provided by

About the course

Cyber Security Specialist - Complete Video Course
 
 
Description:
 
Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security Specialist – Complete Video Course covers a detailed and complete instruction for becoming a cybersecurity expert and also prepares you for the different exams of cyber security so that you can able to obtain a world-class certification for carrying out your job.
 
Any cybersecurity system starts with the task of identifying threats. In the first part of the video lesson, you will know to detect threats and learn how to respond to the threats. Then, you will learn the proper ways of securing your WLAN network. In the section Certified Information Security Manager (CISM), you will train to be a good security manager. Here, you will know how to manage, design, oversee and assess an enterprise’s information security. Next, you will learn the procedures of protecting data and personal information of the patients in the Healthcare Information Systems Security Practitioner (CHISSP) section. After that, the course presents the information related to IT recovery strategy if any disaster happens to your company.
 
Similarly, you will also learn about computer forensic incidents for investing cybercrime. You will know how to handle any incidents in the next section. Besides, the course guides you to be a security leadership officer so that you can lead the team for cybersecurity by the knowledge of risk management, encryption, and information security. Finally, the last section helps you to be a certified Security Sentinel so that you can keep your companies information safe and secure.
 
Assessment:
  • At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
Certification:
  • After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
  • Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Who is this Course for?
Cyber Security Specialist – Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.
 
As there is no experience and qualification required for this course, it is available for all students from any academic background.
 
Requirements
Our Cyber Security Specialist – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
 
Career Path
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
 
Overview of Wireless Communications
 
Overview of Wireless Communications
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Analyzing the Threat Landscape
Classify Threats and Threat Profiles
Perform Ongoing Threat Research
Resources that Aid in Research of Threats
Analyzing Recon Threats to Computing and Network Environments
Implement Threat Modeling
Assess the Impact of Reconnaissance Incidents
Performing Reconnaissance on a Network
Examining Reconnaissance Incidents
Assess the Impact of Social Engineering
Assessing the impact of Social Engineering
Assessing the Impact of Phishing
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks
Cracking Passwords Using a Password File
Assess the Impact of Web Based Attacks
Assessing the Impact of Web-Based Threats
Assess the Impact of Malware
Malware Detection and Removal
Assess the Impact of Hijacking and Impersonation Attacks
Assess the Impact of DoS Incidents
Assessing the Impact of DoS Attacks
Assess the Impact of Threats to Mobile Security
Assess the Impact of Threats to Cloud Security
Analyzing Post-Attack Techniques
Assess Command and Control Techniques
Assessing Command and Control Techniques
Assess Persistence Techniques
Detecting Rootkits
Assess Lateral Movement and Pivoting Techniques
Assess Data Exfiltration Techniques
Steganography
Assess Anti Forensics Techniques
Assessing Anti-Forensics
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments
Perform a Vulnerability Scan with Nessus
Perform a Vulnerability Scan with MBSA
Conduct Penetration Tests on Network Assets
Follow Up on Penetration Testing
Collecting Cyber security Intelligence
Deploy a Security Intelligence Collection and Analysis Platform
Collect Data from Network Based Intelligence Sources
Collecting Network-Based Security Intelligence
Collect Data from Host Based Intelligence Sources
Collecting Host-Based Security Intelligence
Parsing Log files
Analyzing Log Data
Use Common Tools to Analyze Logs
Analyzing Linux Logs for Security Intelligence
Use SIEM Tools for Analysis
Incorporating SIEMs into Security Intelligence Analysis
Parse Log Files with Regular Expressions
Performing Active Asset and Network Analysis
Analyze Incidents with Windows-Based Tools
Windows-Based Incident Analysis Tools
Analyze Incidents with Linux Based Tools
Linux-Based Incident Analysis Tools
Analyze Malware
Analyzing Malware
Analyze Indicators of Compromise
Analyzing Indicators of Compromise
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture
Mitigate Incidents
Hardening Windows Servers
DNS Filtering
Blacklisting and Whitelisting
Prepare for Forensic Investigation as a CSIRT
Investigating Cyber security Incidents
Apply a Forensic Investigation Plan
Securely Collect and Analyze Electronic Evidence
Securely Collecting Electronic Evidence
Analyzing Forensic Evidence
Follow Up on the Results of an Investigation
WLAN Security Overview
WLAN Security Overview and Data Privacy
Networking Basics
Web GUI Introduction
Security Options
Legacy Security
Legacy Security
VPNs
Security Association
MAC Spoofing
Encryption Ciphers and Methods
Encryption Ciphers and Methods
TKIP
CCMP
Encryption Examples
802.11 Authentication Methods
802.11 Authentication Methods
802.1X
EAP
Certified Authority Server Credentials
Dynamic Encryption Key Generation
Dynamic Encryption Key Generation
Authentication and Key Management
RSNA Key Hierarchy
EAP
Information Elements
SOHO 802.11 Security
SOHO 802.11 Security
Wi-Fi Protected Setup (WPS)
Cracking Hashes
Fast Secure Roaming
Fast Secure Roaming
PMKSA
FT Key Hierarchy (e-notes)
802.11K-2008
Wireless Security Risks
Wireless Security Risks
Authentication Attacks
Rogue Devices
Public Hotspots
Wireless LAN Security Auditing
Wireless LAN Security Auditing
Wireless Security Monitoring
Wireless Security Monitoring
Device Tracking
VPNs, Remote Access and Guest Access Services
VPNs, Remote Access and Guest Access Services
Remote Access
WLAN Security Infrastructure
WLAN Security Infrastructure
Management Protocols
Other RADIUS Solutions
Wireless Security Policies
Wireless Security Policies
Other Policies
Information Security Governance
Information Security Governance Overview
Effective Information Security Governance
Information Security Concepts and Technologies
Information Security Manager
Scope and Charter of Information Security Governance
Information Security Governance Metrics
Information Security Strategy Overview
Creating Information Security Strategy
Determining Current State Of Security
Information Security Strategy Development
Strategy Resources
Strategy Constraints
Action Plan to Implement Strategy
Information Risk Management
Risk Management Overview
Good Information Security Risk Management
Information Security Risk Management Concepts
Implementing Risk Management
Risk Assessment
Controls Countermeasures
Recovery Time Objectives
Risk Monitoring and Communication
Information Security Program Development
Development of Information Security Program
Information Security Program Objectives
Information Security Program Development Concepts
Scope and Charter of Information Security Program Development
Information Security Management Framework
Information Security Framework Components
Information Security Program Resources
Implementing an Information Security Program
Information Infrastructure and Architecture
Information Security Program
Security Program Services and Operational Activities
Information Security Incident Management
Incident Management Overview
Incident Response Procedures
Incident Management Organization
Incident Management Resources
Incident Management Objectives
Incident Management Metrics and Indicators
Current State of Incident Response Capability
Current State of Incident Response Capability
BCP DRP
Testing Response and Recovery Plans
Executing the Plan
Healthcare Information Systems Security
The Healthcare Industry
The Healthcare Regulatory Environment
Privacy and Security in Healthcare
Information Governance and Risk Management
Information Risk Assessment
Third-Party Risk Management
Disaster Recovery
Welcome to Disaster Recovery Training
Business Impact Analysis
Risk Analysis8
BCP Strategies
IT Recovery Strategies
Implementation Phase
Testing and Exercise
Maintenance and Updating
Execution Phase
Digital Forensics Examination
Introduction
Computer Forensic Incidents
Investigation Process
Disk Storage Concepts
Digital Acquisition & Analysis
Forensic Examination Protocols
Digital Evidence Protocols
CFI Theory
Digital Evidence Presentation
Computer Forensic Laboratory Protocols
Computer Forensic Processing
Digital Forensics Reporting
Specialized Artifact Recovery
Discovery and ESI
Cell Phone Forensics
USB Forensics
Incident Handling
PDA Forensics
Investigating Harassment
Incident Handling Engineer
Introduction
Threats, Vulnerabilities and Exploits
IH Preparation
Request Tracker for Incident Handling
Preliminary Response
Identification and Initial Response
Sysinternals
Containment
Eradication
Follow-up
Recovery
Virtualization Security
Malware Incident Handling
Security Leadership Officer
Security Management
Risk Management
Encryption
Information Security – Access Control Concepts
Incident Handling and Evidence
Operations Security
Knowing Network Security
Security Sentinel
Basic Security
User Awareness
Implementing Countermeasures
Certified Security Sentinel
Using the Internet at Work
Accessing the Company’s Network Through Your Assigned Computer
Accessing the Corporate Network Remotely
Social Engineering
Understanding and Manipulating our Target
Researching Our Target
Mock Exam
Mock Exam – Cyber Security Specialist – Complete Video Course
Final Exam
Final Exam – Cyber Security Specialist – Complete Video Course

Related article

5 reasons to study online professional computing courses from the University of Essex Online 1. Gain a qualification accredited by the CPD Certific...