Overview
If you want to gain a solid understanding of Level 3 Cyber Security and fast track your dream career, then take a step in the right direction with this industry-standard, comprehensive Level 3 Cyber Security course designed by expert instructors.
Dedicated tutor support and 24/7 customer support are available to all students with this premium quality Level 3 Cyber Security course. Get the help you require and the answers to all your queries throughout the comprehensive syllabus of this Level 3 Cyber Security course.
How will I get my certificate?
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
Who is this course for?
There is no experience or previous qualifications required for enrolment on this Level 3 Cyber Security. It is available to all students, of all academic backgrounds.
Requirements
Our Level 3 Cyber Security is fully compatible with PC’s, Mac’s, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G.
There is no time limit for completing this course, it can be studied in your own time at your own pace.
Career path
Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc.
Course Curriculum
- 8 sections
- 16 lectures
- 00:00:00 total length
-
Network Topologies
00:06:00 -
History and Applications of Computer Networking
00:06:00 -
Protocols and Standards
00:04:00 -
Introduction to OSI Model
00:04:00 -
Layers of OSI Model
00:07:00 -
Introduction to TCP/IP Model
00:10:00 -
OSI Model vs TCP/IP Model
00:04:00 -
Addressing in Computer Networks
00:09:00 -
IP Address- IPv4 and IPv6
00:07:00 -
Classes of IP Address
00:10:00 -
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS
00:03:00 -
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS
00:05:00 -
The Internet Protocol (IP)
00:07:00 -
Address Resolution Protocol (ARP)
00:09:00 -
Dynamic Host Configuration Protocol (DHCP)
00:08:00 -
Internet Control Message Protocol (ICMP)
00:06:00 -
RIP and OSPF Protocols
00:06:00 -
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT
00:03:00 -
What are Sockets?
00:05:00 -
File Transfer Protocol (FTP)
00:03:00 -
Hypertext Transfer Protocol (HTTP)
00:04:00 -
Hyptertext Transfer Protocol/Secure Socket Layer (HTTPS)
00:05:00 -
Domain Name System (DNS)
00:03:00
-
Definition of Computer Security
00:03:00 -
Interesting Facts about Cyber Security
00:05:00 -
History of Cyber Security
00:07:00 -
Scope and Career Insights in Cyber Security
00:08:00
-
Introduction
00:01:00 -
Types of Computer Security
00:03:00 -
Key Terms in Cyber Security
00:07:00 -
The Elements of Information Security
00:06:00 -
Types of Attacks
00:10:00 -
Roles in Cyber Security : Part 1
00:08:00 -
Roles in Cyber Security : Part 2
00:06:00
-
Security Architect’s View of Security
00:08:00 -
What is Vulnerability Assessment?
00:05:00 -
4 Phases of Vulnerability Assessment
00:09:00 -
Introduction to Cryptography
00:06:00 -
Symmetric Encryption
00:03:00 -
Asymmetric Encryption
00:04:00 -
Hashing
00:07:00 -
Security Organizations
00:04:00 -
Critical Thinking in Cyber Security
00:04:00 -
The Five Critical Thinking Skills
00:06:00 -
PRACTICAL : USING NSLOOKUP TOOL
00:03:00
-
Different types of Actors in Cyber Security
00:10:00 -
Types of Cyber Attacks
00:04:00 -
Hacking Organizations around the Globe
00:05:00 -
Security Services and Mechanisms
00:03:00 -
Introduction to Threats
00:03:00 -
What is a Malware?
00:07:00 -
Types of Trojans
00:06:00 -
Types of Virus
00:07:00 -
Have you ever heard about a Ransomware?
00:09:00 -
The Cyber Kill Chain
00:09:00 -
Introduction to Social Engineering
00:05:00 -
Types of Social Engineering
00:07:00
-
Confidentiality – The Most Important Element of Security
00:04:00 -
Introduction to Incident Response Team
00:05:00 -
Phases of Incident Response
00:05:00 -
Laws in Cyber Security
00:05:00 -
What are Audits in Cyber Security
00:04:00 -
Internal Audit vs External Audit
00:04:00 -
The NIST Framework
00:03:00 -
The COBIT Framework
00:04:00 -
Intrusion Detection System
00:05:00 -
Introduction to Firewalls
00:05:00
-
What is DMZ?
00:04:00 -
Different types of Firewalls
00:09:00
-
Claim Your Certificate
00:00:00