This course allows you to dig into cybersecurity technology, architecture and issues that you need to understand to become a cyber-security expert.
This course advances with three goals
- To introduce the basic concepts of cyber-security and policies.
- To introduce you to the applications of these defence mechanisms against cyber-attacks in practical life.
- To change your thinking about technology and security and how you look at any technological device.
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: NYU
|Introduction What You Will Learn from This Course on Cyber Security||00:02:00|
|Module 1 Introduction to Cyber Security – Reading||00:02:00|
|Hacking an Old Fashioned Soda Machine||00:05:00|
|Simple Worm Program||00:05:00|
|Trojan Horse Login Program||00:07:00|
|Malicious Compiler Program||00:08:00|
|Typical Unix Kernel Attack||00:07:00|
|Welcome Lou Manousos Part 1||00:06:00|
|Welcome Lou Manousos Part 2||00:05:00|
|Purpose of Cyber Security||00:05:00|
|Testing for Vulnerabilities||00:05:00|
|Brute Force vs Hueristic Attacks||00:04:00|
|Cryptanalyzing Caesar Cipher||00:05:00|
|Welcome Jose Dominguez||00:10:00|
|Examining Cyber Threats More Closely – Assignments and Reading||00:03:00|
|SQL Slammer Worm of 2003||00:05:00|
|Nachi Worm of 2003||00:10:00|
|Welcome Elad Yoran||00:12:00|
|Assets and Infrastructure||00:08:00|
|Making Security and Cost Decisions Based on Risk||00:05:00|
|Threat Trees and Completeness of Analysis||00:06:00|
|Module 4 Security Risk Analysis – Reading||00:03:00|
|Mapping Assets to Threats||00:07:00|
|Estimating Risk for Threat Asset Pairs||00:05:00|
|Example Case Study Matrix Part 1||00:09:00|
|Example Case Study Matrix Part 2||00:09:00|
|Example Case Study Matrix Part 3||00:07:00|
|Mapping Assets, Threats, Vulnerabilities, and Attacks||00:06:00|
|Welcome Nasir Memon||00:15:00|
|Submit Your Assignment||00:00:00|
No Reviews found for this course.