• No products in the basket.

Course Overview

Learn how to make a genuine difference in your life by taking our popular Cyber Security. Our commitment to online learning and our technical experience has been put to excellent use within the contents of these educational modules. By enrolling today, you can take your knowledge of Cyber Security to a whole new level and quickly reap the rewards of your study in the field you have chosen.We are confident that you will find the skills and information that you will need to succeed in this area and excel in the eyes of others. Do not rely on substandard training or half-hearted education. Commit to the best, and we will help you reach your full potential whenever and wherever you need us.

Please Note: Cyber Security provides valuable and significant theoretical training for all. However, it does not offer official lessons for skilled practices. Always check details with the appropriate authorities or management.

Learning Outcomes

  • Instant access to verified and reliable information
  • Participation in inventive and interactive training exercises
  • Quick assessment and guidance for all subjects
  • CPD endorsement for proof of acquired skills and knowledge
  • Freedom to study in any location and at a pace that suits you
  • Expert support from dedicated tutors committed to online learning

Your Path to Success

By completing the training in Cyber Security, you will be able to significantly demonstrate your acquired abilities and knowledge of Cyber Security. This can give you an advantage in career progression, job applications, and personal mastery in this area.

Is This Course Right for You?

This course is designed to provide an introduction to Cyber Security and offers an excellent way to gain the vital skills and confidence to start a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Full-time and part-time learners are equally supported and it can take just 20 to 30 hours to gain accreditation, with study periods being entirely customisable to your needs.

Certificate of Achievement 

Endorsed Certificate of Achievement by the Quality Licence Scheme

An endorsed certificate will be issued for the learners as proof of their achievement after the completion of this course. After successful course completion, learners will be able to order an endorsed certificate as proof of their new achievement. Only for £139 you can order and get endorsed certificates delivered to your home. International students have to pay an extra £10 as a postage charge.

CPD & IAO Certification from HF Online

The learners have to successfully complete the assessment of this course to achieve the CPD & IAO certificates. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39. 


This course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an endorsed lesson. Academy for Health & Fitness will be able to advise you on any further recognition, for example, progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. 

Assessment Method

You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass the exam and achieve Quality Licence Scheme endorsed certificates. Our expert trainers will assess your assignment and give you feedback after you submit the assignment.  

Course Curriculum

Ethical Hacking
Overview 00:35:00
Reconnaissance 00:25:00
Protocols 01:25:00
Windows Hacking 01:19:00
Attacking Web Technologies 00:56:00
Pen Testing Wireless Networks 01:34:00
Professional Hacking
Security Fundamentals 00:51:00
Access Controls 00:33:00
Protocols 00:36:00
Cryptography 00:52:00
Why Vulnerability Assessments? 00:36:00
Vulnerability Tools of the Trade 00:10:00
Output Analysis and Reports 00:13:00
Reconnaisance, Enumeration and Scanning 00:51:00
Gaining Access 00:31:00
Maintaining Access 00:17:00
Covering Tracks 00:18:00
Malware 00:09:00
Buffer Overflows 00:22:00
Password Cracking 00:33:00
Penetration Testing I
Packet Capturing 00:38:00
Layer 2 Attacks 00:59:00
Layer 3 Attacks on Cisco Based Infrastructures 01:09:00
Pivoting and Relays 00:20:00
IPv6 Attacks 00:49:00
VPN Attacks 00:38:00
Defeating SSL 00:48:00
IDS/IPS Evasion 01:11:00
Penetration Testing II
Logistics of Pen Testing 00:25:00
Linux Fundamentals 00:22:00
Information Gathering 00:38:00
Detecting Live Systems 00:34:00
Enumeration 00:25:00
Vulnerability Assessments 00:20:00
Malware Goes Undercover 00:28:00
Windows Hacking 00:39:00
Hacking UNIX/Linux 00:36:00
Advanced Exploitation Techniques 00:28:00
Pen Testing Wireless Networks 00:34:00
Networks, Sniffing and IDS 00:42:00
Injecting the Database 00:26:00
Attacking Web Technologies 00:30:00
Project Documentation 00:17:00
Web Application Security
Web Application Security 01:20:00
Secure SDLC 00:26:00
OWASP TOP 10 00:28:00
Risk Management 00:35:00
Threat Modeling 00:18:00
Authentication and Authorization Attacks 00:24:00
Session Management 00:35:00
Security Architecture 00:29:00
Input Validation and Data Sanitization 00:24:00
AJAX Security 00:05:00
Insecurity Code Discovery and Mitigation 00:39:00
Application Mapping 00:07:00
Cryptography 00:28:00
Testing Methodologies 00:31:00
Security Leadership
Security Management 00:58:00
Risk Management 00:35:00
Encryption 00:31:00
Information Security – Access Control Concepts 00:31:00
Incident Handling and Evidence 01:01:00
Operations Security 00:48:00
Knowing Network Security 01:12:00
Security Sentinel
Basic Security 00:17:00
User Awareness 00:27:00
Implementing Countermeasures 00:09:00
Certified Security Sentinel 00:16:00
Using the Internet at Work 00:23:00
Accessing the Company’s Network Through Your Assigned Computer 00:19:00
Accessing the Corporate Network Remotely 00:09:00
Social Engineering 00:13:00
Understanding and Manipulating our Target 00:16:00
Researching Our Target 00:11:00
Vulnerability Assessment
Why Vulnerability Assessment 00:46:00
Vulnerability Types 00:23:00
Assessing the Network 00:40:00
Assessing Web Servers & Applications 00:27:00
Assessing Remote & VPN Services 00:17:00
Vulnerability Assessment Tools of the Trade 00:15:00
Output Analysis 00:12:00
Assignment – Cyber Security 3 weeks, 4 days
Order Your Certificate
Claim Your QLS Certificate 00:00:00


Course Reviews


0 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

IT & Cyber Security
  • 1 year
  • Number of Units83
  • Number of Quizzes0
  • 3 weeks, 5 days

Let your e-learning become a life changing experience with the health, therapy and fitness courses from the Academy for Health & Fitness.

163 City Road, London, England, EC1V 1NR

Validate Your Certificate