Your cart is empty
Empty notifications
Login
Register
Home
Courses
Your cart is empty
Empty notifications
Introduction
Lesson 5/33
|
Study Time: Min
Course:
Level 4 Diploma in Cyber Security
Resource Links:
📄 Document
Overview (Google Doc):
Click here to view the document
Lectures Link:
Video Link 1
Video Link 2
Video Link 3
Video Link 4
Video Link 5
Video Link 6
Video Link 7
Video Link 8
Video Link 9
Spreadsheet
Google Sheets:
Click here to view the spreadsheet
Previous Lesson
Next Lesson
UeCapmus
Product Designer
Profile
Book a Meeting
Class Sessions
1- Introduction
2- Cyber security threats and risks: Understanding the complex nature of cyber security threats and risks.
3- Mega breaches and malware/ransomware attacks: Understanding recent mega breaches and explaining malware and ransomware attacks.
4- Advancements in threats and malicious hackers: Understanding how threats and malicious hackers are advancing and developing customized intrusion tools.
5- Introduction
6- Core vulnerabilities in network and online environments.
7- Security thinking and tools in network environments: Explain how the emergence of security thinking and tools can benefit a network environment.
8- Exploitation of computer networking, web applications, and software.
9- Internal risks and exposure: Evaluate the internal risks and exposure within an organization.
10- Process and physical defenses against network intrusions.
11- Key security concepts in a large and distributed organization.
12- Holistic approach to network and systems resilience.
13- Database security: Protecting databases from compromises of confidentiality, integrity, and availability.
14- Introduction
15- Cloud-based storage solutions: Concepts and models of storing databases in the cloud.
16- Relationship between computer programming and hacking: Understanding the connection between programming skills and hacking abilities.
17- Python programming language: Understanding the features and uses of Python in both non-malicious and malicious hacking.
18- Introduction
19- Incident Response: Understanding the role and composite parts of Incident Response as a business function and how CERTS operate.
20- Aligned task/task forces for Business Continuity, Disaster Recovery, and Crisis Management.
21- Major computer incident investigations.
22- Laws and guidance in relation to the conduct of planned and structured major incident investigations
23- Introduction
24- Strategy and strategic management: Understand the concept of strategy, strategic management, planning, and buy-in in relation to cyber security.
25- Legislation, industry standards, training, and accreditations.
26- Implementation of security and risk management policies.
27- Future legal and technical environment: Understand the future legal and technical environment and its impact on cyber security.
28- Planning and designing a security audit: Understand how to plan and design a security audit for a cyber network.
29- Introduction
30- Threats and risks to traditional and emerging financial services.
31- Architectural structures of traditional and emerging financial markets.
32- Payments systems and their connection to underpinning financial services architecture.
33- Cryptocurrencies and their connection to underpinning financial services architecture.
noreply@uecampus.com
-->