Learn the basics of
In this online cybersecurity certification course you will develop your IT knowledge and gain the cybersecurity skills required to protect and defend IT systems and information in the digital age.
1.Exploring the Fundamentals of Networking
In this lesson, you will explore the fundamentals of networking. You will look at network topology, how data is created, the OSI -TCP/IP stack, identifying different devices in a network, and understanding how different networks create the internet.
2.Setting Up a Small Network
Identify hardware required for creating a network before diving into a practical demonstration on creation of traffic (data) on devices and transferring it to the ISP (internet service provider).
3.Concept of a Wi-Fi or Wireless Network
Explore wireless routers and access points, and how they operate. Manage an on-premise access points and understand cloud-managed access points, and the benefits of using them. This lesson takes an in-depth look at how devices are connected wirelessly, the capabilities of networking, and how a wireless network adaptor works.
4.Types of Wireless Access Points
This lesson will provide you with a solid understanding of the different types of wireless networks, which are WAN (Wide Area Networks), LAN (Local Area Networks), and PAN ( Personal Area Network).
This lesson delves into the concept of logical addressing, how CPU generates the logical address, and how to map the logcal address with the memory-management unit to its corresponding physical address.
6.Benefits of a Wi-Fi Wireless Network
Understand the benefits, convenience and differences of the internet, intranet, and extranet. This lesson also looks at how these can increase productivity in an enterpise network. Explore Network File Sharing over a wireless network, and lastly, see how encrypted information (traffic) is sent over the extranet network.
7.Design and Deployment of Enterprise Wireless
This lesson explores the architecture of centralised deployment, converged deployment and cloud-based deployment. Learn how to set these up and understand the differences when applied in an enterprise network.
8.Implementing Security on a Wireless and Wired Network
The final lesson in module one looks at attacks on WLANs, and how to use wireless protocol analysers for emerging security solutions.
1.Identifying the Need for Security
What are network security threats, and what is the discrepancy between active and passive attacks? Today's lesson is about identifying the need for security. We will look at network vulnerabilities, the difference between threats, malware, vulnerability and risks, and discover ways to identify network security threats.
We've all heard that passwords like "123456" or "P@ssword" are the worst things to choose when protecting ourselves online. What exactly are the advantages of passwords and biometric security? Why do we use antivirus software? This lesson answers those questions plus explores blocking ads and enhancing software features with the lates security patches.
3.Risk of Network Attacks
Do you know the risks of network attacks? After this lesson, you understand common network security risks, the scale and impact of industrial espionage, and network disruption and resilience.
4.Identify and Mitigate Network Attacks
Understand the theory behind "network cloaking" and how it can mitigate risk, the Intrusion Prevention System (IPS) and how it works, and protecting a network with security "onion" and "artichoke" approaches.
5.Securing Managing Wireless Devices
Learn how to implement security on a wireless network, use cloud-based tools to manage a network, and minimise the risks to your wireless network.
6.Securing Web, Email and Social Networking
In this lesson, you will know how creating security awareness for employees helps reduce risk in the workplace. You'll understand why businesses need security awareness training, and the importance of encrypting sensitive data.
7.Applying Physical Security on Devices
Apply password-protect and understand the benefits of its use on your device, backup data using cloud services, and the different tracking software processes on mac/Linux/windows.
8.Protecting Your Data
There are countless videos and documentaries online about the impact of social media on personal information and behaviours, yet there are still hundreds of millions of people logging in and checking their phones multiple times a day without protecting themselves. From a security perspective, we all need to learn the dangers that lurk on social media. Understand how social media could be used to gather intelligence on you by hackers, explore phishing emails and learn how to identify an authentic WiFi network.
1.Introduction to Network Security
Learn the different types of network attacks and prevention techniques, analyse data (traffic) on a network using Wireshark and network miner, and restrict and monitor access to your network and data.
2.Firewalls and VPN
Carrying over from our previous lesson, we will explore data using Wireshark in more detail, verify encryption of VPNs on the network, and how to set up a defence mechanism.
3.Anti-virus and Anti-malware Software
Learn how to identify a threat in a system using anti-malware, use Artificial Intelligence and Machine Learning in real-time protection and on-demand scanning, and apply malware protection and best practices.
4.Network Segmentation/Intrusion Prevention Systems
This lesson will explore network segmentation, security considerations when implementing segmentation, and ways to improve the performance of a network.
By the end of this lesson, you will understand access control and its common types - Role-based Access Control (RBAC), Discretionary Access Control (DAC) and Mandatory Access Control (MAC).
This lesson serves as an introduction to Authentication, Authorization, and Accounting (AAA). We'll explore its benefits in application security, how it is applied, and the role of encryption within it.
This lesson gives you an introduction to data analytics, including how to use analytics to build user-centric behavioral patterns. We'll explore the benefits of behavioural analytics, particularly with Artificial Intelligence and Machine Learning.
8.Data Loss Prevention/Event Management
After this lesson you'll know what data loss prevention (DLP) is and its main objectives, followed by best practices.