You must be logged in to take this course → LOGIN | REGISTER NOW
This is the course which focuses solely on preventive cybersecurity. This is where you will learn to prevent a disaster before it happens in cyber world.
Cyber-attacks are inevitable in current time and they will happen. So this course doesn’t only teaches you to prevent them but also on what to do when it happens, observing, making decisions based on traffic patterns or packets and on defensive measures.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: NYU
Course Curriculum
Module 01 | |||
Introduction What You Will Learn from This Course on Cyber Security | 00:02:00 | ||
Basic Network Security – Reading | 00:03:00 | ||
Security Through Obscurity | 00:05:00 | ||
TCPIP Evolution and Security | 00:06:00 | ||
TCPIP Overview | 00:08:00 | ||
IP Spoofing | 00:06:00 | ||
TCP Sequence Number Attack | 00:06:00 | ||
Module 02 | |||
Packet Flooding | 00:05:00 | ||
Packet Sniffing | 00:06:00 | ||
SYN Packets for Access Control | 00:05:00 | ||
Definition of a Firewall | 00:06:00 | ||
Firewall Stateful versus Stateless | 00:06:00 | ||
Assignments and Reading | 00:03:00 | ||
Packet Filtering | 00:08:00 | ||
Sample Packet Filtering and Reference Architecture | 00:06:00 | ||
Default Firewall Block | 00:05:00 | ||
Firewall Rules to Allow Outbound Web Browsing | 00:05:00 | ||
Firewall Rules to Allow Telnet and Other TCP Services | 00:03:00 | ||
Establishing Corporate Policy Rules | 00:04:00 | ||
Module 03 | |||
FTP Protocol | 00:06:00 | ||
Firewall Rules for FTP | 00:04:00 | ||
Application Proxy Filtering | 00:07:00 | ||
Forward and Reverse Proxies | 00:05:00 | ||
Assignments and Readings | 00:03:00 | ||
Firewall Architectures Part 1 | 00:06:00 | ||
Firewall Architectures Part 2 | 00:06:00 | ||
Management by Exception | 00:06:00 | ||
System Auditing | 00:07:00 | ||
Basics of Intrusion Detection | 00:08:00 | ||
Signature Versus Behavioral Detection | 00:06:00 | ||
Module 04 | |||
IDS Versus IPS | 00:07:00 | ||
Design of SIEM | 00:05:00 | ||
Design of a SOC | 00:06:00 | ||
Interview Dino Dai Zovi | 00:10:00 | ||
Module 4 Enterprise Network Security – Readings | 00:02:00 | ||
Practical Limitations of Perimeter | 00:08:00 | ||
APT Schema Through Perimeter Holes | 00:07:00 | ||
Third Party Security | 00:06:00 | ||
Target APT Attack | 00:06:00 | ||
Large Government Agency Attack | 00:05:00 | ||
Layer 3 DDOS Protection | 00:06:00 | ||
Layer 7 Application Level DDOS Risk | 00:04:00 | ||
Large Financial Website DDOS Attacks | 00:05:00 | ||
Network Security Industry Overview | 00:03:00 | ||
Interview Ray Cheng Pt 1 | 00:14:00 | ||
Interview Ray Cheng Pt 2 | 00:06:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.