The knowledge of IT is a must for today’s world, no matter whether you are involved with business or not. The IT and Cyber Security Diploma course covers a general overview of IT field along with the security system.

The course is split into two sections: One deals with IT concepts whereas the other part deals with Cybersecurity system. In the IT part, you will learn the fundamental concepts of computer and malware. Then you will know about internet security basics, analysing attacks and post attacks, responding to cybersecurity incidents and more.

Entry Requirement:

  • This course is available to all learners, of all academic backgrounds.
  • Learners should be aged 16 or over to undertake the qualification.
  • Good understanding of English language, numeracy and ICT are required to attend this course.

Assessment:  

  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
  • Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam.

Certification:

  • After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24.
  • PDF certificate’s turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days.

Why choose us?

  • Affordable, engaging & high-quality e-learning study materials;
  • Tutorial videos/materials from the industry leading experts;
  • Study in a user-friendly, advanced online learning platform;
  • Efficient exam systems for the assessment and instant result;
  • The UK & internationally recognized accredited qualification;
  • Access to course content on mobile, tablet or desktop from anywhere anytime;
  • The benefit of applying for NUS Extra Discount Card;
  • 24/7 student support via email.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Course Curriculum

Computer Fundamentals
Basic Computer Terms 00:15:00
Advanced Terms 00:15:00
Networking Basics 00:15:00
Basic Internet Concepts 00:30:00
Internet Security 00:30:00
Computers in the Workplace 00:15:00
Tele-Commuting 00:15:00
The Electronic World 00:15:00
Ergonomics 00:15:00
Safety and the Environment 00:15:00
Being Proactive 00:15:00
Identifying Yourself 00:15:00
Protecting Your Data 01:00:00
Understanding Malware 00:15:00
Protecting Against Malware 00:15:00
Malware Protection
Why You Need To Worry About “Malware” 01:00:00
Viruses 01:00:00
Spyware/Adware 01:00:00
Safety & Security at the Browser Level 01:00:00
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
Glossary of Terms 01:00:00
Cyber Security Basics
Introduction 00:30:00
Child Safety Online 01:00:00
Secure Payment Sites 01:00:00
Online Banking 00:30:00
How To Keep Your Password Safe 00:30:00
Common Scams 01:00:00
How I Got Pharmed 01:00:00
Virus Protection 01:00:00
Self Maintenance 00:30:00
Personal Information Online 01:00:00
Is The Internet Safe? 00:30:00
Importance of Cyber Security 00:30:00
Internet Security Management
Internet Security- The Truth About Identify Theft 01:00:00
Internet Security for Teens- What You Need to Do 01:00:00
Internet Security-Downloading Email Attachments 00:15:00
Internet Security- 5 Tips for Using Facebook 00:30:00
Internet Security- 8 Tips to Protect Yourself When Dating Online 00:30:00
Internet Security for Teens and Tweens- 10 Tips to Keep You Protected 00:15:00
Internet Security- Parental Control Software 00:30:00
Internet Security- Online Safety for Your Children 00:30:00
Cyber Bullying- Another Aspect of Breaking Internet Security 00:30:00
Tips to Ensure Internet Security 00:30:00
Internet Security- Downloading Music off the Internet 01:00:00
Internet Security- Protect Your Wireless Connection 00:30:00
Internet Security- How to Deal with Spyware 00:15:00
Internet Security- Protecting Yourself When You Shop Online 00:15:00
Internet Security- Storing Your Password on Your Computer 01:00:00
Make Sure Your Emails Are Safe: Tips for Internet Security 01:00:00
Internet Security- Why Should You Use a Firewall? 01:00:00
Internet security-Signs That Your Child’s Safety Might Be Compromised 01:00:00
Internet Security- Safety When Using Public Computers 01:00:00
Internet Security- Storing Your Password on Your Computer 01:00:00
Internet Security-Using Social Utility Sites 00:30:00
IT Security
Spyware Can Destroy 00:30:00
How Does Spyware Spread? 01:00:00
How To Remove Spyware 01:00:00
Anti Spyware Program 01:00:00
The Anti Anti-Spyware Programs 00:30:00
Research And Learn More 00:30:00
Choosing The Best Anti Spyware Tool 01:00:00
Computer Security And Spyware 01:00:00
The Programs To Avoid 00:15:00
Is It Legal? 00:30:00
Checklist Of Protection 00:15:00
Overview of Wireless Communications
Identify the Importance of Risk Management FREE 00:11:00
Assess Risk 00:13:00
Mitigate Risk 00:22:00
Integrate Documentation into Risk Management 00:14:00
Classify Threats and Threat Profiles 00:07:00
Perform Ongoing Threat Research 00:12:00
Resources that Aid in Research of Threats 00:03:00
Implement Threat Modeling 00:09:00
Assess the Impact of Reconnaissance Incidents 00:10:00
Performing Reconnaissance on a Network 00:07:00
Examining Reconnaissance Incidents 00:08:00
Assess the Impact of Social Engineering 00:10:00
Assessing the impact of Social Engineering 00:07:00
Assessing the Impact of Phishing 00:03:00
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks 00:10:00
Cracking Passwords Using a Password File 00:08:00
Assess the Impact of Web Based Attacks 00:11:00
Assessing the Impact of Web-Based Threats 00:03:00
Assess the Impact of Malware 00:08:00
Malware Detection and Removal 00:05:00
Assess the Impact of Hijacking and Impersonation Attacks 00:13:00
Assess the Impact of DoS Incidents 00:09:00
Assessing the Impact of DoS Attacks 00:04:00
Assess the Impact of Threats to Mobile Security 00:08:00
Assess the Impact of Threats to Cloud Security 00:10:00
Analyzing Post-Attack Techniques
Assess Command and Control Techniques 00:08:00
Assessing Command and Control Techniques 00:10:00
Assess Persistence Techniques 00:05:00
Detecting Rootkits 00:03:00
Assess Lateral Movement and Pivoting Techniques 00:13:00
Assess Data Exfiltration Techniques 00:04:00
Steganography 00:03:00
Assess Anti Forensics Techniques 00:09:00
Assessing Anti-Forensics 00:03:00
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments 00:16:00
Perform a Vulnerability Scan with Nessus 00:07:00
Perform a Vulnerability Scan with MBSA 00:05:00
Conduct Penetration Tests on Network Assets 00:18:00
Follow Up on Penetration Testing 00:06:00
Deploy a Security Intelligence Collection and Analysis Platform 00:19:00
Collect Data from Network Based Intelligence Sources 00:15:00
Collecting Network-Based Security Intelligence 00:07:00
Collect Data from Host Based Intelligence Sources 00:13:00
Collecting Host-Based Security Intelligence 00:15:00
Parsing Log files 00:03:00
Analyzing Log Data
Use Common Tools to Analyze Logs 00:22:00
Analyzing Linux Logs for Security Intelligence 00:08:00
Use SIEM Tools for Analysis 00:07:00
Incorporating SIEMs into Security Intelligence Analysis 00:18:00
Parse Log Files with Regular Expressions 00:25:00
Analyze Incidents with Windows-Based Tools 00:17:00
Windows-Based Incident Analysis Tools 00:19:00
Analyze Incidents with Linux Based Tools 00:05:00
Linux-Based Incident Analysis Tools 00:07:00
Analyze Malware 00:11:00
Analyzing Malware 00:03:00
Analyze Indicators of Compromise 00:20:00
Analyzing Indicators of Compromise 00:15:00
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture 00:22:00
Mitigate Incidents 00:16:00
Hardening Windows Servers 00:14:00
DNS Filtering 00:05:00
Blacklisting and Whitelisting 00:09:00
Prepare for Forensic Investigation as a CSIRT 00:03:00
Apply a Forensic Investigation Plan 00:10:00
Securely Collect and Analyze Electronic Evidence 00:08:00
Securely Collecting Electronic Evidence 00:05:00
Analyzing Forensic Evidence 00:07:00
Follow Up on the Results of an Investigation 00:04:00
Mock Exam
Mock Exam- IT and Cyber Security Diploma 00:30:00
Final Exam
Final Exam- IT and Cyber Security Diploma 00:30:00

Course Reviews

4.8

4.8
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

489 STUDENTS ENROLLED

Have you any inquiry?

  • By submitting your information, you agree to the terms and conditions stated in our Privacy Policy

About

We are a company who is best known for offering awarding body accredited courses for anyone who wishes to take their professional life to the next level.

 11 Floor, 15 St Botolph Street, London EC3A 7BB
020 3744 3990
info@johnacademy.co.uk

Certificate Code

Free CV Review

free cv review

 

 

top

© John Academy.