• LOGIN
  • No products in the cart.

You must be logged in to take this course  →   LOGIN | REGISTER NOW

This is the course which focuses solely on preventive cybersecurity. This is where you will learn to prevent a disaster before it happens in cyber world.

Cyber-attacks are inevitable in current time and they will happen. So this course doesn’t only teaches you to prevent them but also on what to do when it happens, observing, making decisions based on traffic patterns or packets and on defensive measures.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: NYU

Course Curriculum

Module 01
Introduction What You Will Learn from This Course on Cyber Security 00:02:00
Basic Network Security – Reading 00:03:00
Security Through Obscurity 00:05:00
TCPIP Evolution and Security 00:06:00
TCPIP Overview 00:08:00
IP Spoofing 00:06:00
TCP Sequence Number Attack 00:06:00
Module 02
Packet Flooding 00:05:00
Packet Sniffing 00:06:00
SYN Packets for Access Control 00:05:00
Definition of a Firewall 00:06:00
Firewall Stateful versus Stateless 00:06:00
Assignments and Reading 00:03:00
Packet Filtering 00:08:00
Sample Packet Filtering and Reference Architecture 00:06:00
Default Firewall Block 00:05:00
Firewall Rules to Allow Outbound Web Browsing 00:05:00
Firewall Rules to Allow Telnet and Other TCP Services 00:03:00
Establishing Corporate Policy Rules 00:04:00
Module 03
FTP Protocol 00:06:00
Firewall Rules for FTP 00:04:00
Application Proxy Filtering 00:07:00
Forward and Reverse Proxies 00:05:00
Assignments and Readings 00:03:00
Firewall Architectures Part 1 00:06:00
Firewall Architectures Part 2 00:06:00
Management by Exception 00:06:00
System Auditing 00:07:00
Basics of Intrusion Detection 00:08:00
Signature Versus Behavioral Detection 00:06:00
Module 04
IDS Versus IPS 00:07:00
Design of SIEM 00:05:00
Design of a SOC 00:06:00
Interview Dino Dai Zovi 00:10:00
Module 4 Enterprise Network Security – Readings 00:02:00
Practical Limitations of Perimeter 00:08:00
APT Schema Through Perimeter Holes 00:07:00
Third Party Security 00:06:00
Target APT Attack 00:06:00
Large Government Agency Attack 00:05:00
Layer 3 DDOS Protection 00:06:00
Layer 7 Application Level DDOS Risk 00:04:00
Large Financial Website DDOS Attacks 00:05:00
Network Security Industry Overview 00:03:00
Interview Ray Cheng Pt 1 00:14:00
Interview Ray Cheng Pt 2 00:06:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

7 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841