عبر الإنترنت
Adams Academy Cyber Security Diploma Level 3 Adams Academy
  • مدة الدورة التدريبية: 42 ساعة إبدأ الآن
  • معتمدة من قبل: CiQCPD Qualification Standards
  • الشهادة:
  • طريقة تقديم الدورة: عبر عرض الفيديو

تفاصيل الدورة

Cybersecurity is the state of being protected against the criminal or unauthorized use of the electronic data. Cybersecurity is a preventative technique to prevent the integrity of networks, programs and data from cyber attack, damage and unauthorized access.
The knowledge of cybersecurity and internet security is a must nowadays because of the rise of hackers and cyberspace. Any institution needs to be prepared to protect against the threats in cyberspace. The people involved in cybersecurity must need to the basic principles and practices of cybersecurity to protect their institution. The course provides the necessary skills needed to protect networks, secure electronic assets, prevent attacks, ensure privacy, and build secure infrastructures. The course includes information security, ethical and legal practices, and mitigating cyber vulnerabilities. You will also learn the procedures for incident response and analysis.

COURSE CURRICULUM

Cyber Security Basics
  • Introduction
  • Child Safety Online
  • Secure Payment Sites
  • Online Banking
  • How To Keep Your Password Safe
  • Common Scams
  • How I Got Pharmed
  • Virus Protection
  • Self Maintenance
  • Personal Information Online
  • Is The Internet Safe?
  • Importance of Cyber Security
Threat Detection and Response
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management
  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats
  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing
  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • Assess the Impact of Malware
  • Malware Detection and Removal
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assessing the Impact of DoS Attacks
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security
  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics
  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files
  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions
  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise – Part 1
  • Analyze Indicators of Compromise – Part 2
  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT
  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation
  • Checklist Of Protection
Internet Security Management
  • Internet Security- The Truth About Identify Theft
  • Internet Security for Teens- What You Need to Do
  • Internet Security-Downloading Email Attachments
  • Internet Security- 5 Tips for Using Facebook
  • Internet Security- 8 Tips to Protect Yourself When Dating Online
  • Internet Security for Teens and Tweens- 10 Tips to Keep You Protected
  • Internet Security- Parental Control Software
  • Internet Security- Online Safety for Your Children
  • Cyber Bullying- Another Aspect of Breaking Internet Security
  • Tips to Ensure Internet Security
  • Internet Security- Downloading Music off the Internet
  • Internet Security- Protect Your Wireless Connection
  • Internet Security- How to Deal with Spyware
  • Internet Security- Protecting Yourself When You Shop Online
  • Internet Security- Make Sure Your Passwords Protect You
  • Make Sure Your Emails Are Safe: Tips for Internet Security
  • Internet Security- Why Should You Use a Firewall?
  • Internet security-Signs That Your Child’s Safety Might Be Compromised
  • Internet Security- Safety When Using Public Computers
  • Internet Security- Storing Your Password on Your Computer
  • Internet Security-Using Social Utility Sites
IT Security
  • Spyware Can Destroy
  • How Does Spyware Spread?
  • How To Remove Spyware
  • Anti Spyware Program
  • The Anti Anti-Spyware Programs
  • Research And Learn More
  • Choosing The Best Anti Spyware Tool
  • Computer Security And Spyware
  • The Programs To Avoid
  • Is It Legal?
تحديث بتاريخ 17 September, 2019

نبذة عن معهد Adams Academy

About us

Adams Academy is best known for offering award body accredited online courses that are available for anyone who wishes to acquire a certification and take their professional life to the next level. As an online learning site, we are aware of the fact that there are a lot of people out there who considers themselves to be a curious learner but the courses that they are interested in are not available in the area. So, we have decided to give them a chance to learn in a convenient way – in their own convenient place and time.

Our Mission

To make learning more accessible to learning enthusiasts, regardless of where they are residing in the world. To offer different courses of different levels for the students to choose from. To position our company as a leader in the industry of online learning.

Our Vision

Maintain the good credibility and reputation that we have built as online courses provider

سجل 209 طالباً في معهد Adams Academy عبر Laimoon
عرض الجميع دورات Adams Academy

قيِم هذه الصفحة