• No products in the cart.

This course allows you to dig into cybersecurity technology, architecture and issues that you need to understand to become a cyber-security expert.

This course advances with three goals

  1. To introduce the basic concepts of cyber-security and policies.
  2. To introduce you to the applications of these defence mechanisms against cyber-attacks in practical life.
  3. To change your thinking about technology and security and how you look at any technological device.


This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.


Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success


Course Credit: NYU

Course Curriculum

Module 01
Introduction What You Will Learn from This Course on Cyber Security 00:02:00
Module 1 Introduction to Cyber Security – Reading 00:02:00
Hacking an Old Fashioned Soda Machine 00:05:00
Simple Worm Program 00:05:00
Trojan Horse Login Program 00:07:00
Malicious Compiler Program 00:08:00
Typical Unix Kernel Attack 00:07:00
Module 02
Welcome Lou Manousos Part 1 00:06:00
Welcome Lou Manousos Part 2 00:05:00
Purpose of Cyber Security 00:05:00
Adversary Types 00:08:00
Vulnerability Types 00:05:00
Threat Types 00:06:00
Confidentiality Threat 00:06:00
Integrity Threat 00:07:00
Availability Threat 00:06:00
Fraud Threat 00:05:00
Module 03
Testing for Vulnerabilities 00:05:00
Attacks 00:05:00
Brute Force vs Hueristic Attacks 00:04:00
Crytanalysis 00:05:00
Cryptanalyzing Caesar Cipher 00:05:00
Welcome Jose Dominguez 00:10:00
Examining Cyber Threats More Closely – Assignments and Reading 00:03:00
SQL Slammer Worm of 2003 00:05:00
Nachi Worm of 2003 00:10:00
Botnet Design 00:12:00
Botnet Arithmetic 00:11:00
Module 04
Welcome Elad Yoran 00:12:00
Assets and Infrastructure 00:08:00
Calculating Risk 00:08:00
Making Security and Cost Decisions Based on Risk 00:05:00
Threat Trees and Completeness of Analysis 00:06:00
Module 4 Security Risk Analysis – Reading 00:03:00
Mapping Assets to Threats 00:07:00
Estimating Risk for Threat Asset Pairs 00:05:00
Example Case Study Matrix Part 1 00:09:00
Example Case Study Matrix Part 2 00:09:00
Example Case Study Matrix Part 3 00:07:00
Mapping Assets, Threats, Vulnerabilities, and Attacks 00:06:00
Welcome Nasir Memon 00:15:00
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews


9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841