You must be logged in to take this course → LOGIN | REGISTER NOW
This [course_title] has been designed to allow the learner garner knowledge about security issues and the importance of safeguarding data. Here, you will learn all the techniques to prevent security attacks and protect valuable data.
Any computer connected to the internet is vulnerable to a cyber-attack. In this course, you will learn about the basic terms like social engineering, identity theft, data classification, malware, piracy, etc. These terms are associated with the security of any business and/or home users. You will also learn about access control, network security, government litigation, and risk management, security software development, security architecture and design, disaster recovery planning, legal regulations, physical security, etc. These concepts and techniques will help you train yourself in this professional field and prevent any loss of information by making your security system formidable.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: Edukite
Course Curriculum
Course Overview | |||
Course Overview | 00:14:00 | ||
Types of Security Threats | |||
Types of Security Threats | 00:29:00 | ||
Social Engineering | |||
Social Engineering | 00:30:00 | ||
Identity Theft | |||
Identity Theft | 00:29:00 | ||
Data Classification | |||
Data Classification | 00:28:00 | ||
Types of Classifications | 00:18:00 | ||
Protecting Your Digital Information | |||
Protecting Your Digital Information | 00:45:00 | ||
Password Management | 00:13:00 | ||
Malware | |||
Malware | 00:17:00 | ||
Software Detection | 00:28:00 | ||
Security from End-to-End | |||
Security from End-to-End | 00:27:00 | ||
Secure E-mail Use | 00:21:00 | ||
Secure Web Browsing | 00:29:00 | ||
Piracy | |||
Piracy | 00:16:00 | ||
Security Policies | |||
Security Policies | 00:17:00 | ||
Moving Forward | |||
Moving Forward | 00:12:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.