This is a course which offers advanced topics on Cyber Security. This course focuses on accomplishing three goals.
- Introduce you to the advanced topics in cloud security.
- Layout a practical foundation on this topic and apply them in real life.
- Creating a lifelong learning in Cybersecurity.
This is more of a practical course you will be studying with a lesser amount of theoretical topics.
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: NYU
|Enterprise and Infrastructure Security – Introduction||00:02:00|
|Assignments and Reading||00:03:00|
|Using Video for Security Awareness||00:02:00|
|Security Assessment and Audit||00:04:00|
|What is GRC||00:10:00|
|NIST Framework Overview||00:05:00|
|PCI DSS Framework Overview||00:05:00|
|Challenges of Compliance versus Security||00:05:00|
|Welcome Roger Thornton Part 1 CTO, AlienVault||00:13:00|
|Module 2 Hybrid Cloud Security – Reading||00:01:00|
|Enterprise Shift to Hybrid Cloud||00:07:00|
|Workload Micro Segmentation||00:06:00|
|Defense in Depth through Micro Segmentation||00:05:00|
|Cloud Access Security Brokers||00:04:00|
|Advanced Hybrid Cloud Security Architecture Part 1||00:06:00|
|Advanced Hybrid Cloud Security Architecture Part 2||00:05:00|
|Advanced Hybrid Cloud Security Architecture Part 3||00:04:00|
|Security of Isolated Servers Outside Perimeter||00:04:00|
|Welcome John Popolizio Founder, Riverdale Group||00:14:00|
|Blockchain, Anonymity, and Critical Infrastructure Protection – Reading||00:03:00|
|Blockchain Part 1||00:07:00|
|Blockchain Part 2||00:10:00|
|Onion Routing and Tor||00:08:00|
|Chaum Binding Algorithm||00:10:00|
|Critical Infrastructure Part 1 Requirements||00:07:00|
|Critical Infrastructure Part 2 Protection Methods||00:09:00|
|Mobility Security and Deception – Assignments and Reading||00:02:00|
|Using Deception and Honey Pots for Security||00:05:00|
|Welcome Elena Kvochko, Cyber Security Expert||00:08:00|
|Advice on Careers in Cyber Security||00:05:00|
|How to Continue a Learning Plan in Cyber Security||00:03:00|
|Submit Your Assignment||00:00:00|
No Reviews found for this course.