• LOGIN
  • No products in the cart.

This is the course that will round down your foundational knowledge on internet security. It is a course which will develop a sense of responsibility to protect data for people who relies heavily on their devices in you.

How people attack internet security? How to defend against these attacks? At the end of this course, you will be able to define, recognize vulnerabilities and how to defend them.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: Google

Course Curriculum

Module 01
Security Defense against the digital dark arts – Course Introduction 00:06:00
Malicious Software – The CIA Triad 00:03:00
Essential Security Terms 00:04:00
Malicious Software 00:05:00
Malware Continued 00:03:00
Network Attacks 00:04:00
Network Attacks – Denial of Service 00:04:00
Client Side Attacks 00:03:00
Password Attacks 00:02:00
Deceptive Attacks 00:04:00
Module 02
Cryptography in Action 00:09:00
Asymmetric Cryptography 00:08:00
Symmetric Encryption Algorithms 00:09:00
Rob What a Security Engineer Does 00:01:00
Asymmetric Cryptography 00:08:00
Asymmetric Encryption Algorithms 00:06:00
Hashing 00:04:00
Hashing Algorithms 00:06:00
Hashing Algorithms continued 00:06:00
Public Key Infrastructure 00:09:00
Module 03
Securing Network Traffic 00:06:00
Cryptographic Hardware 00:07:00
Authentication Best Practices 00:06:00
Multifactor Authentication 00:13:00
Authentication – Certificates 00:04:00
Authentication – LDAP 00:04:00
Authentication – RADIUS 00:02:00
Authentication – Kerberos 00:08:00
Authentication – TACACS+ 00:02:00
Authentication – Single Sign On 00:04:00
Authentication – Rob Path to IT 00:02:00
Authorization and Access Control Methods 00:02:00
Module 04
Access Control 00:05:00
Access Control List 00:02:00
Tracking Usage and Access 00:03:00
IT Security – Rob Important Skills in Security 00:02:00
Network Hardening Best Practices 00:09:00
Network Hardware Hardening 00:09:00
Network Software Hardening 00:05:00
IT Technical Support – Joe Personal Obstacle 00:01:00
Heather Social Engineering 00:02:00
WEP Encryption and Why You Shouldn’t Use It 00:09:00
Module 05
Wireless Security – Let’s Get Rid of WEP! WPAWPA2 00:14:00
Wireless Hardening 00:03:00
Sniffing the Network 00:05:00
Wireshark and tcpdump 00:07:00
Intrusion Detection Prevention Systems 00:07:00
Intro to Defense in Depth 00:01:00
Module 06
System Hardening – Disabling Unnecessary Components 00:05:00
System Hardening – Host Based Firewall 00:05:00
System Hardening – Logging and Auditing 00:07:00
System Hardening – Antimalware Protection 00:08:00
System Hardening – Disk Encryption 00:07:00
System Hardening – Heather Self Learning 00:02:00
Software Patch Management 00:07:00
Module 07
Application Hardening – Application Policies 00:05:00
Intro to Risk in the Workplace 00:01:00
Security Goals 00:08:00
Measuring and Assessing Risk 00:06:00
Risk in the Workplace – Privacy Policy 00:04:00
Users – Third Party Security 00:04:00
Users – Security Training 00:04:00
Creating a Company Culture for Security – Alex Grit Story 00:02:00
Incident Reporting and Analysis 00:07:00
Incident Response and Recovery 00:06:00
3 Creating a Company Culture for Security – Amir Interview 00:01:00
Incident Handling – Ari Interview 00:02:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

12 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841