Overview
If you want to gain a solid understanding of Level 3 Cyber Security and fast track your dream career, then take a step in the right direction with this industry-standard, comprehensive Level 3 Cyber Security course designed by expert instructors.
Dedicated tutor support and 24/7 customer support are available to all students with this premium quality Level 3 Cyber Security course. Get the help you require and the answers to all your queries throughout the comprehensive syllabus of this Level 3 Cyber Security course.
How will I get my certificate?
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
Who is this course for?
There is no experience or previous qualifications required for enrolment on this Level 3 Cyber Security. It is available to all students, of all academic backgrounds.
Requirements
Our Level 3 Cyber Security is fully compatible with PC’s, Mac’s, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G.
There is no time limit for completing this course, it can be studied in your own time at your own pace.
Career path
Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc.
Course Curriculum
- 8 sections
- 70 lectures
- 6 hours, 29 minutes total length
-
Network Topologies00:06:00
-
History and Applications of Computer Networking00:06:00
-
Protocols and Standards00:04:00
-
Introduction to OSI Model00:04:00
-
Layers of OSI Model00:07:00
-
Introduction to TCP/IP Model00:10:00
-
OSI Model vs TCP/IP Model00:04:00
-
Addressing in Computer Networks00:09:00
-
IP Address- IPv4 and IPv600:07:00
-
Classes of IP Address00:10:00
-
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS00:03:00
-
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS00:05:00
-
The Internet Protocol (IP)00:07:00
-
Address Resolution Protocol (ARP)00:09:00
-
Dynamic Host Configuration Protocol (DHCP)00:08:00
-
Internet Control Message Protocol (ICMP)00:06:00
-
RIP and OSPF Protocols00:06:00
-
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT00:03:00
-
What are Sockets?00:05:00
-
File Transfer Protocol (FTP)00:03:00
-
Hypertext Transfer Protocol (HTTP)00:04:00
-
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS)00:05:00
-
Domain Name System (DNS)00:03:00
-
Definition of Computer Security00:03:00
-
Interesting Facts about Cyber Security00:05:00
-
History of Cyber Security00:07:00
-
Scope and Career Insights in Cyber Security00:08:00
-
Introduction00:01:00
-
Types of Computer Security00:03:00
-
Key Terms in Cyber Security00:07:00
-
The Elements of Information Security00:06:00
-
Types of Attacks00:10:00
-
Roles in Cyber Security : Part 100:08:00
-
Roles in Cyber Security : Part 200:06:00
-
Security Architect’s View of Security00:08:00
-
What is Vulnerability Assessment?00:05:00
-
4 Phases of Vulnerability Assessment00:09:00
-
Introduction to Cryptography00:06:00
-
Symmetric Encryption00:03:00
-
Asymmetric Encryption00:04:00
-
Hashing00:07:00
-
Security Organizations00:04:00
-
Critical Thinking in Cyber Security00:04:00
-
The Five Critical Thinking Skills00:06:00
-
PRACTICAL : USING NSLOOKUP TOOL00:03:00
-
Different types of Actors in Cyber Security00:10:00
-
Types of Cyber Attacks00:04:00
-
Hacking Organizations around the Globe00:05:00
-
Security Services and Mechanisms00:03:00
-
Introduction to Threats00:03:00
-
What is a Malware?00:07:00
-
Types of Trojans00:06:00
-
Types of Virus00:07:00
-
Have you ever heard about a Ransomware?00:09:00
-
The Cyber Kill Chain00:09:00
-
Introduction to Social Engineering00:05:00
-
Types of Social Engineering00:07:00
-
Confidentiality – The Most Important Element of Security00:04:00
-
Introduction to Incident Response Team00:05:00
-
Phases of Incident Response00:05:00
-
Laws in Cyber Security00:05:00
-
What are Audits in Cyber Security00:04:00
-
Internal Audit vs External Audit00:04:00
-
The NIST Framework00:03:00
-
The COBIT Framework00:04:00
-
Intrusion Detection System00:05:00
-
Introduction to Firewalls00:05:00
-
What is DMZ?00:04:00
-
Different types of Firewalls00:09:00
-
Claim Your Certificate