Understand the importance of data securityIn the age of the internet, our private information has never been more vulnerable and important to protect.On this four-week course, you’ll understand what information security means and the core principles you can use to better protect your data, business structure, and the people within your organisation.Guided by the experts at the International Council of Electronic Commerce Consultants (EC- Council), you’ll also learn the best practices for identifying threats and securing your data.Identify and approach security threats to your dataThe internet can be a very dangerous place when it comes to your personal information. There are volumes of scams, viruses, and malware that have the potential to access your data.This course will enable you to recognise various potential threats. You’ll also learn the skills and techniques to safely handle threats without compromising your data.Recognise the tensions between security and privacy in cyber securityPrivacy and security are closely connected. While privacy is your ability to control the use of your information, security refers to how your information is protected.You’ll examine relevant examples which portray the constant push-and-pull between privacy and security. You’ll also be equipped to discuss this relationship with reference to data collection and information privacy in marketing and business.Increase your IT, tech, and cryptography knowledgeFinally, you’ll explore cryptography, the study of secure communication techniques, to ensure you finish the course with a comprehensive understanding of information security.Learning from the specialists at the EC-Council, you’ll be empowered to take data protection into your own hands.This course is designed for new and experienced IT security professionals.It is also suited for IT technicians, programmers and anyone who wishes to increase their information security knowledge or break into the field of IT security.
According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.Learn how to prevent malware attacksThis cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.Understand cyber security risks and build cyber resilienceThe threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks.This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.
Develop your expertise in identity and access managementIdentity and access management is the process through which access to restricted data is controlled. This helps data security by making sure only authorized users can access the data, and only in specific contexts.This identity and access management course follows on from the previous course in this ExpertTrack. If you are new to identity and access management, you may benefit from completing the first course prior to this.You’ll explore various real-life situations in which identity and access management challenges are raised. These will cover areas such as enterprise and B2C integration, using case studies to illustrate learning. You’ll also explore the use of identity and access management in the public sector, looking at G2C services and citizen ID.You’ll further use case studies to see how the theory applies in practice. On completing the course, you’ll be able to apply what you learned to boost your organization’s data security and cyber resilience.Engage with the evolving challenges of identity and access managementThis cyber security training course covers general topics to advance your understanding of key identity and access management topics. These include:single sign-on authenticationfederation identity and managementcloud identity management modelsAI in identity and access managementidentity and access management implementationidentity and access management design architectureData security and cyber resilience requirements are in a state of constant evolution. The topics covered in this course will help you build up-to-date identity and access management processes. This will be a crucial part of your organization’s cybersecurity strategy.This cybersecurity training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks.This might include data administrators, those working with sensitive data, or those targeting a career in cybersecurity.
Protect your organisation with effective network securityAs cybercrime continues to grow, analysis of social networks has become a powerful tool in criminology and criminal investigations.This four-week course will give you a comprehensive introduction to network analysis and security, allowing you to provide effective digital security to your organisation.Develop a working knowledge of network securityThe first topic you’ll cover in this course is the fundamentals of network security. You’ll learn about this ever-present cybersecurity issue from scratch.Understanding lab setup, virtual machine installation, operating system installation, routers, and firewalls will give you the foundation you need to deal with threats from social networks.Explore network monitoring and specific attack typesOnce you’re comfortable with network security basics, you’ll move on to wireless security, network attack types, and specific network monitoring tools that provide a high level of digital security.You’ll also take a close look at browser and password security methods, and the essential first-line defences they provide against cybercrime.Detect and deal with cybersecurity threats before they become problemsBy the end of this course, you’ll be fully equipped to not only set up a secure company network but to perform network analysis and detect cyber threats early. You’ll learn all you need to know to avoid becoming a digital criminology statistic.This course is designed for network and cybersecurity professionals interested in using network analysis to deal with operational issues and identify security breaches.
Gain an introduction to cyber securityThis 3-week course for beginners will highlight the importance of cyber security in the current landscape. It will be particularly useful for IT professionals.Cyber attacks cost a huge amount of money annually, and this figure is on the rise. According to sources, the cost of cybercrime for 2021 will rise to $6 trillion, double the estimated figure for 2015. By 2025, this is predicted to rise to $10.5 trillion.On this course, you’ll learn about common types of cyber attacks, including phishing, viruses, and social engineering attacks, and how you can protect against them. You’ll also learn how to build a safe password policy, build in ransomware protection, and best practices for mobile data security.Explore common cyber attacks and how to protect against themTo understand why cyber security is important, we must understand the risks we face.This cyber security training course willintroduce you to some common and dangerous cyber attacks, and key topics such as:how to build a good password policy and how using a password manager increases data securityrisks associated with using unknown USB drives, including USB “rubber ducky” password stealershow to defend against viruses, including ransomware protection, and what to do when infectedcyber security risks associated with social media, including social engineering attackshow to identify spear phishing and phishing emailsbest practices for mobile data security, including VPNs and DNS redirectsdisaster recovery and how to prepare for worst-case scenariosCompleting this introduction to cyber security will enable you to take the first key steps to protecting your data. With these cyber security basics, you can prevent sensitive information getting into the wrong hands.This cyber security training is aimed at beginners to cyber security and IT professionals who want to understand how to protect their organization from cyber attacks.This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.
Strengthen data security with identity and access managementThis cyber security training course will introduce you to identity and access management.Identity and access management is a key tool in data security. It describes the processes by which different users are granted certain data permissions and under what contexts.This supports data security by ensuring that sensitive information can only be accessed by select users, at select times. Through identity and access management, the possibility of breaches and cyber attacks is greatly reduced.Once cyber resilience is strengthened, you can focus data security processes on key moments of vulnerability. Identity and access management also serve to reduce the risk of human error, the greatest cause of data breaches.This course will introduce you to key identity management models and tools, to help increase cyber resilience at your organization.Discover key identity and access management conceptsIn this cyber security training course, you will be introduced to key identity and access management concepts. It is the first of two courses covering identity and access management.You will learn:what identity and access management means and why it is importantthe meaning and importance of the identity and management concepts of ‘identification’ and ‘authentication’the meaning and importance of the identity and access management concept of ‘authorisation’the role of organizational data security processes in identity and access managementThis is a highly practical cyber security training course, aimed to help you contribute to data security and cyber resilience. You’ll be able to directly apply the identity and access management concepts you learn at your organization.This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyber attacks.This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.
Identify the downsides of passwords in digital securityPasswords are an integral part of digital security, but it’s important to know their vulnerabilities to maintain strong cyber security.On this two-week course, you’ll explore different types of password attacks and how to use them in a penetration test and security assessment.Through practical experience, you’ll understand how malicious password attacks occur and what you can do to prevent them.Learn multiple password attacks and use them in a penetration testYou’ll begin by covering the basic theory of password protection by understanding topics on cryptography, password entropy and hashing. You’ll then put this into practice by learning how to crack passwords.You’ll learn how to set up a small environment for security testing where you’ll delve into a diverse range of methodologies to bypass passwords, including brute force attack, dictionary attack, rainbow table attack and keylogger.Crack different types of passwords and learn how to create secure passwordsAs you learn how to crack a variety of password types, you’ll become familiar with the tools required to prevent password attacks.. What’s more, you’ll learn how to create strong, unforgettable passwords that offer more security.By the end of the course, you’ll understandthe theory behind password attacks, how to create a uncrackable password, and the solutions and techniques you can implement to prevent attacks in future.This course is designed for beginner and intermediate level learners interested in improving their understanding of cyber security and how to create secure passwords.You should be familiar with computers, bash (or similar), and be able to install Windows + Linux.To complete this course, you will need:Operating system: Mac, Linux, WindowsBrowser: Firefox, ChromeVirtualBox, Latest VersionWindows 10 Developer or Evaluation VM for VirtualBoxKali ISO
Discover how to build cyber resilience in your organizationDiscover why cyber security is important, and how to build organizational cyber resilience in these four cyber security courses.
Get practical, hands on experience in cybersecurityBuild essential cyber security skills and learn about security threats and how to manage them.
Examine the importance of software security and risks to web applicationsIt can be difficult to fully understand software vulnerabilities if you only read about them, which is why this 2-week course allows you to take a practical approach to software security.On this course, you’ll develop your understanding of the most critical risks to web application security and learn first-hand how to exploit these vulnerabilities.This practice-orientated course will help you become more security aware and teach you how to avoid these weaknesses in your own applications.Understand the OWASP Top 10 and how to use them to minimise riskThe OWASP Top 10 is a standard awareness document about the largest risks to web applications. You’ll begin by reviewing and discussing each risk and learn how to exploit them to see the vulnerability in action.You’ll learn how to use a deliberately vulnerable web application where you will exploit at least ten vulnerabilities.You’ll be able to identify and mitigate these critical security risks by reviewing vulnerable source code and learning how to fix it.Learn the common exploitation techniques used to test software securityBy putting into practice the common exploitation techniques used to test software security, you’ll gain a full understanding of the impacts of security breaches. This includes XXE (XML External Entities), XSS (Cross-Site Scripting) and Insecure Deserialization.You’ll also examine the various threat agents to your software security and how to prevent them from conducting damaging activities.By the end of the course, you’ll be comfortable increasing security in your organisation and the Software Development Lifecycle (SDLC).This course is designed for anyone interested in software security. You should be familiar using the web browser and have prior knowledge about the HTTP protocol, HTML and JavaScript.You should also have a computer that is capable of running VirtualBox.
Understand the importance of network securityCyber attacks on your business or home network can have devastating results. This four-week course will give you the knowledge and skills to identify and prevent these attacks, as well as helping you increase your network security.Using a practical approach to cyber security, you’ll learn how to deal with the growing problem of network attacks and understand how malicious hackers could break into your network.Learn how to identify types of network attacksOn this course, you’ll build your understanding of network security and how to deal with disaster recovery, should a network attack happen.You’ll start with an introductionto the different types of attackers and network attacks that occur, including phishing, spear phishing, DDOS, and ransomware.You’ll also learn vital techniques to help you recover from an attack.Conduct threat assessment scanning and learn how to use security toolsHaving understood the theory of network attacks, you’ll use a hands-on approach to strengthen your knowledge.You’ll discover and use the tools needed to conduct threat assessment scanning including Nmap, Spiderfoot, OpenVas and Nessus.You’ll also understand how to carry out a penetration test using ExploitDB.Learn how to use OSINT and how to secure your networkUsing OSINT tools (open-source intelligence), you’ll learn how to gather intelligence on the attacker, allowing you to narrow down potential vulnerabilities and understand how hackers recon your network.These transferable cyber security skills can then be used to increase the security in your network, making it a harder target for potential attackers.This course offers a comprehensive guide to network security with video walk-throughs, making it suitable for both beginners and experienced users.You don’t need any prior knowledge to join.