Exclusive Deal! nan% Off, Today Only!
Buy 1 or more contact sale
Learn how to make a genuine difference in your life by taking our popular Cyber Security. Our commitment to online learning and our technical experience has been put to excellent use within the contents of these educational modules. By enrolling today, you can take your knowledge of Cyber Security to a whole new level and quickly reap the rewards of your study in the field you have chosen.We are confident that you will find the skills and information that you will need to succeed in this area and excel in the eyes of others. Do not rely on substandard training or half-hearted education. Commit to the best, and we will help you reach your full potential whenever and wherever you need us.
Please Note: Cyber Security provides valuable and significant theoretical training for all. However, it does not offer official lessons for skilled practices. Always check details with the appropriate authorities or management.
By completing the training in Cyber Security, you will be able to significantly demonstrate your acquired abilities and knowledge of Cyber Security. This can give you an advantage in career progression, job applications, and personal mastery in this area.
This course is designed to provide an introduction to Cyber Security and offers an excellent way to gain the vital skills and confidence to start a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Full-time and part-time learners are equally supported and it can take just 20 to 30 hours to gain accreditation, with study periods being entirely customisable to your needs.
Endorsed Certificate of Achievement by the Quality Licence Scheme
An endorsed certificate will be issued for the learners as proof of their achievement after the completion of this course. After successful course completion, learners will be able to order an endorsed certificate as proof of their new achievement. Only for £139 you can order and get endorsed certificates delivered to your home. International students have to pay an extra £10 as a postage charge.
CPD Certification from HF Online
The learners have to successfully complete the assessment of this course to achieve the CPD certificates. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39.Â
This course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an endorsed lesson. Academy for Health & Fitness will be able to advise you on any further recognition, for example, progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website.Â
You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass the exam and achieve Quality Licence Scheme endorsed certificates. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. Â
Ethical Hacking | |||
Overview | 00:35:00 | ||
Reconnaissance | 00:25:00 | ||
Protocols | 01:25:00 | ||
Windows Hacking | 01:19:00 | ||
Attacking Web Technologies | 00:56:00 | ||
Pen Testing Wireless Networks | 01:34:00 | ||
Professional Hacking | |||
Security Fundamentals | 00:51:00 | ||
Access Controls | 00:33:00 | ||
Protocols | 00:36:00 | ||
Cryptography | 00:52:00 | ||
Why Vulnerability Assessments? | 00:36:00 | ||
Vulnerability Tools of the Trade | 00:10:00 | ||
Output Analysis and Reports | 00:13:00 | ||
Reconnaisance, Enumeration and Scanning | 00:51:00 | ||
Gaining Access | 00:31:00 | ||
Maintaining Access | 00:17:00 | ||
Covering Tracks | 00:18:00 | ||
Malware | 00:09:00 | ||
Buffer Overflows | 00:22:00 | ||
Password Cracking | 00:33:00 | ||
Penetration Testing I | |||
Packet Capturing | 00:38:00 | ||
Layer 2 Attacks | 00:59:00 | ||
Layer 3 Attacks on Cisco Based Infrastructures | 01:09:00 | ||
Pivoting and Relays | 00:20:00 | ||
IPv6 Attacks | 00:49:00 | ||
VPN Attacks | 00:38:00 | ||
Defeating SSL | 00:48:00 | ||
IDS/IPS Evasion | 01:11:00 | ||
Penetration Testing II | |||
Logistics of Pen Testing | 00:25:00 | ||
Linux Fundamentals | 00:22:00 | ||
Information Gathering | 00:38:00 | ||
Detecting Live Systems | 00:34:00 | ||
Enumeration | 00:25:00 | ||
Vulnerability Assessments | 00:20:00 | ||
Malware Goes Undercover | 00:28:00 | ||
Windows Hacking | 00:39:00 | ||
Hacking UNIX/Linux | 00:36:00 | ||
Advanced Exploitation Techniques | 00:28:00 | ||
Pen Testing Wireless Networks | 00:34:00 | ||
Networks, Sniffing and IDS | 00:42:00 | ||
Injecting the Database | 00:26:00 | ||
Attacking Web Technologies | 00:30:00 | ||
Project Documentation | 00:17:00 | ||
Web Application Security | |||
Web Application Security | 01:20:00 | ||
Secure SDLC | 00:26:00 | ||
OWASP TOP 10 | 00:28:00 | ||
Risk Management | 00:35:00 | ||
Threat Modeling | 00:18:00 | ||
Authentication and Authorization Attacks | 00:24:00 | ||
Session Management | 00:35:00 | ||
Security Architecture | 00:29:00 | ||
Input Validation and Data Sanitization | 00:24:00 | ||
AJAX Security | 00:05:00 | ||
Insecurity Code Discovery and Mitigation | 00:39:00 | ||
Application Mapping | 00:07:00 | ||
Cryptography | 00:28:00 | ||
Testing Methodologies | 00:31:00 | ||
Security Leadership | |||
Security Management | 00:58:00 | ||
Risk Management | 00:35:00 | ||
Encryption | 00:31:00 | ||
Information Security – Access Control Concepts | 00:31:00 | ||
Incident Handling and Evidence | 01:01:00 | ||
Operations Security | 00:48:00 | ||
Knowing Network Security | 01:12:00 | ||
Security Sentinel | |||
Basic Security | 00:17:00 | ||
User Awareness | 00:27:00 | ||
Implementing Countermeasures | 00:09:00 | ||
Certified Security Sentinel | 00:16:00 | ||
Using the Internet at Work | 00:23:00 | ||
Accessing the Company’s Network Through Your Assigned Computer | 00:19:00 | ||
Accessing the Corporate Network Remotely | 00:09:00 | ||
Social Engineering | 00:13:00 | ||
Understanding and Manipulating our Target | 00:16:00 | ||
Researching Our Target | 00:11:00 | ||
Vulnerability Assessment | |||
Why Vulnerability Assessment | 00:46:00 | ||
Vulnerability Types | 00:23:00 | ||
Assessing the Network | 00:40:00 | ||
Assessing Web Servers & Applications | 00:27:00 | ||
Assessing Remote & VPN Services | 00:17:00 | ||
Vulnerability Assessment Tools of the Trade | 00:15:00 | ||
Output Analysis | 00:12:00 | ||
Assignment | |||
Assignment – Cyber Security | 3 weeks, 4 days | ||
Order Your Certificate | |||
Claim Your QLS Certificate | 00:00:00 |
3694
4.5
£25