This course allows you to dig into cybersecurity technology, architecture and issues that you need to understand to become a cyber-security expert.
This course advances with three goals
- To introduce the basic concepts of cyber-security and policies.
- To introduce you to the applications of these defence mechanisms against cyber-attacks in practical life.
- To change your thinking about technology and security and how you look at any technological device.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: NYU
Course Curriculum
Module 01 | |||
Introduction What You Will Learn from This Course on Cyber Security | 00:02:00 | ||
Module 1 Introduction to Cyber Security – Reading | 00:02:00 | ||
Hacking an Old Fashioned Soda Machine | 00:05:00 | ||
Simple Worm Program | 00:05:00 | ||
Trojan Horse Login Program | 00:07:00 | ||
Malicious Compiler Program | 00:08:00 | ||
Typical Unix Kernel Attack | 00:07:00 | ||
Module 02 | |||
Welcome Lou Manousos Part 1 | 00:06:00 | ||
Welcome Lou Manousos Part 2 | 00:05:00 | ||
Purpose of Cyber Security | 00:05:00 | ||
Adversary Types | 00:08:00 | ||
Vulnerability Types | 00:05:00 | ||
Threat Types | 00:06:00 | ||
Confidentiality Threat | 00:06:00 | ||
Integrity Threat | 00:07:00 | ||
Availability Threat | 00:06:00 | ||
Fraud Threat | 00:05:00 | ||
Module 03 | |||
Testing for Vulnerabilities | 00:05:00 | ||
Attacks | 00:05:00 | ||
Brute Force vs Hueristic Attacks | 00:04:00 | ||
Crytanalysis | 00:05:00 | ||
Cryptanalyzing Caesar Cipher | 00:05:00 | ||
Welcome Jose Dominguez | 00:10:00 | ||
Examining Cyber Threats More Closely – Assignments and Reading | 00:03:00 | ||
SQL Slammer Worm of 2003 | 00:05:00 | ||
Nachi Worm of 2003 | 00:10:00 | ||
Botnet Design | 00:12:00 | ||
Botnet Arithmetic | 00:11:00 | ||
Module 04 | |||
Welcome Elad Yoran | 00:12:00 | ||
Assets and Infrastructure | 00:08:00 | ||
Calculating Risk | 00:08:00 | ||
Making Security and Cost Decisions Based on Risk | 00:05:00 | ||
Threat Trees and Completeness of Analysis | 00:06:00 | ||
Module 4 Security Risk Analysis – Reading | 00:03:00 | ||
Mapping Assets to Threats | 00:07:00 | ||
Estimating Risk for Threat Asset Pairs | 00:05:00 | ||
Example Case Study Matrix Part 1 | 00:09:00 | ||
Example Case Study Matrix Part 2 | 00:09:00 | ||
Example Case Study Matrix Part 3 | 00:07:00 | ||
Mapping Assets, Threats, Vulnerabilities, and Attacks | 00:06:00 | ||
Welcome Nasir Memon | 00:15:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.