You must be logged in to take this course → LOGIN | REGISTER NOW
This is a course which offers advanced topics on Cyber Security. This course focuses on accomplishing three goals.
- Introduce you to the advanced topics in cloud security.
- Layout a practical foundation on this topic and apply them in real life.
- Creating a lifelong learning in Cybersecurity.
This is more of a practical course you will be studying with a lesser amount of theoretical topics.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: NYU
Course Curriculum
Module 01 | |||
Enterprise and Infrastructure Security – Introduction | 00:02:00 | ||
Assignments and Reading | 00:03:00 | ||
Social Engineering | 00:06:00 | ||
Phishing | 00:08:00 | ||
Security Awareness | 00:05:00 | ||
Using Video for Security Awareness | 00:02:00 | ||
Security Assessment and Audit | 00:04:00 | ||
Module 02 | |||
What is GRC | 00:10:00 | ||
NIST Framework Overview | 00:05:00 | ||
PCI DSS Framework Overview | 00:05:00 | ||
Challenges of Compliance versus Security | 00:05:00 | ||
Welcome Roger Thornton Part 1 CTO, AlienVault | 00:13:00 | ||
Module 2 Hybrid Cloud Security – Reading | 00:01:00 | ||
Enterprise Shift to Hybrid Cloud | 00:07:00 | ||
Workload Micro Segmentation | 00:06:00 | ||
Defense in Depth through Micro Segmentation | 00:05:00 | ||
Cloud Access Security Brokers | 00:04:00 | ||
Module 03 | |||
Advanced Hybrid Cloud Security Architecture Part 1 | 00:06:00 | ||
Advanced Hybrid Cloud Security Architecture Part 2 | 00:05:00 | ||
Advanced Hybrid Cloud Security Architecture Part 3 | 00:04:00 | ||
Security of Isolated Servers Outside Perimeter | 00:04:00 | ||
Module 04 | |||
Welcome John Popolizio Founder, Riverdale Group | 00:14:00 | ||
Blockchain, Anonymity, and Critical Infrastructure Protection – Reading | 00:03:00 | ||
Hashing Algorithms | 00:08:00 | ||
Blockchain Part 1 | 00:07:00 | ||
Blockchain Part 2 | 00:10:00 | ||
Cyber Attribution | 00:08:00 | ||
Module 05 | |||
Onion Routing and Tor | 00:08:00 | ||
Chaum Binding Algorithm | 00:10:00 | ||
Critical Infrastructure Part 1 Requirements | 00:07:00 | ||
Critical Infrastructure Part 2 Protection Methods | 00:09:00 | ||
Mobility Security and Deception – Assignments and Reading | 00:02:00 | ||
Mobility Security | 00:09:00 | ||
Module 06 | |||
IMSI Catching | 00:06:00 | ||
IoT Security | 00:07:00 | ||
IoT Botnets | 00:03:00 | ||
Using Deception and Honey Pots for Security | 00:05:00 | ||
Welcome Elena Kvochko, Cyber Security Expert | 00:08:00 | ||
Advice on Careers in Cyber Security | 00:05:00 | ||
How to Continue a Learning Plan in Cyber Security | 00:03:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.