This is the course that will round down your foundational knowledge on internet security. It is a course which will develop a sense of responsibility to protect data for people who relies heavily on their devices in you.
How people attack internet security? How to defend against these attacks? At the end of this course, you will be able to define, recognize vulnerabilities and how to defend them.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: Google
Course Curriculum
Module 01 | |||
Security Defense against the digital dark arts – Course Introduction | 00:06:00 | ||
Malicious Software – The CIA Triad | 00:03:00 | ||
Essential Security Terms | 00:04:00 | ||
Malicious Software | 00:05:00 | ||
Malware Continued | 00:03:00 | ||
Network Attacks | 00:04:00 | ||
Network Attacks – Denial of Service | 00:04:00 | ||
Client Side Attacks | 00:03:00 | ||
Password Attacks | 00:02:00 | ||
Deceptive Attacks | 00:04:00 | ||
Module 02 | |||
Cryptography in Action | 00:09:00 | ||
Asymmetric Cryptography | 00:08:00 | ||
Symmetric Encryption Algorithms | 00:09:00 | ||
Rob What a Security Engineer Does | 00:01:00 | ||
Asymmetric Cryptography | 00:08:00 | ||
Asymmetric Encryption Algorithms | 00:06:00 | ||
Hashing | 00:04:00 | ||
Hashing Algorithms | 00:06:00 | ||
Hashing Algorithms continued | 00:06:00 | ||
Public Key Infrastructure | 00:09:00 | ||
Module 03 | |||
Securing Network Traffic | 00:06:00 | ||
Cryptographic Hardware | 00:07:00 | ||
Authentication Best Practices | 00:06:00 | ||
Multifactor Authentication | 00:13:00 | ||
Authentication – Certificates | 00:04:00 | ||
Authentication – LDAP | 00:04:00 | ||
Authentication – RADIUS | 00:02:00 | ||
Authentication – Kerberos | 00:08:00 | ||
Authentication – TACACS+ | 00:02:00 | ||
Authentication – Single Sign On | 00:04:00 | ||
Authentication – Rob Path to IT | 00:02:00 | ||
Authorization and Access Control Methods | 00:02:00 | ||
Module 04 | |||
Access Control | 00:05:00 | ||
Access Control List | 00:02:00 | ||
Tracking Usage and Access | 00:03:00 | ||
IT Security – Rob Important Skills in Security | 00:02:00 | ||
Network Hardening Best Practices | 00:09:00 | ||
Network Hardware Hardening | 00:09:00 | ||
Network Software Hardening | 00:05:00 | ||
IT Technical Support – Joe Personal Obstacle | 00:01:00 | ||
Heather Social Engineering | 00:02:00 | ||
WEP Encryption and Why You Shouldn’t Use It | 00:09:00 | ||
Module 05 | |||
Wireless Security – Let’s Get Rid of WEP! WPAWPA2 | 00:14:00 | ||
Wireless Hardening | 00:03:00 | ||
Sniffing the Network | 00:05:00 | ||
Wireshark and tcpdump | 00:07:00 | ||
Intrusion Detection Prevention Systems | 00:07:00 | ||
Intro to Defense in Depth | 00:01:00 | ||
Module 06 | |||
System Hardening – Disabling Unnecessary Components | 00:05:00 | ||
System Hardening – Host Based Firewall | 00:05:00 | ||
System Hardening – Logging and Auditing | 00:07:00 | ||
System Hardening – Antimalware Protection | 00:08:00 | ||
System Hardening – Disk Encryption | 00:07:00 | ||
System Hardening – Heather Self Learning | 00:02:00 | ||
Software Patch Management | 00:07:00 | ||
Module 07 | |||
Application Hardening – Application Policies | 00:05:00 | ||
Intro to Risk in the Workplace | 00:01:00 | ||
Security Goals | 00:08:00 | ||
Measuring and Assessing Risk | 00:06:00 | ||
Risk in the Workplace – Privacy Policy | 00:04:00 | ||
Users – Third Party Security | 00:04:00 | ||
Users – Security Training | 00:04:00 | ||
Creating a Company Culture for Security – Alex Grit Story | 00:02:00 | ||
Incident Reporting and Analysis | 00:07:00 | ||
Incident Response and Recovery | 00:06:00 | ||
3 Creating a Company Culture for Security – Amir Interview | 00:01:00 | ||
Incident Handling – Ari Interview | 00:02:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.