Your cart is empty
Empty notifications
Login
Register
Home
Courses
Your cart is empty
Empty notifications
Introduction
Lesson 14/33
|
Study Time: Min
Course:
Level 4 Diploma in Cyber Security
Additional Resource Links
Lecture Videos
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
📄 Supporting Documents
Lecture Notes 1
Lecture Notes 2
Previous Lesson
Next Lesson
UeCapmus
Product Designer
Profile
Book a Meeting
Class Sessions
1- Introduction
2- Cyber security threats and risks: Understanding the complex nature of cyber security threats and risks.
3- Mega breaches and malware/ransomware attacks: Understanding recent mega breaches and explaining malware and ransomware attacks.
4- Advancements in threats and malicious hackers: Understanding how threats and malicious hackers are advancing and developing customized intrusion tools.
5- Introduction
6- Core vulnerabilities in network and online environments.
7- Security thinking and tools in network environments: Explain how the emergence of security thinking and tools can benefit a network environment.
8- Exploitation of computer networking, web applications, and software.
9- Internal risks and exposure: Evaluate the internal risks and exposure within an organization.
10- Process and physical defenses against network intrusions.
11- Key security concepts in a large and distributed organization.
12- Holistic approach to network and systems resilience.
13- Database security: Protecting databases from compromises of confidentiality, integrity, and availability.
14- Introduction
15- Cloud-based storage solutions: Concepts and models of storing databases in the cloud.
16- Relationship between computer programming and hacking: Understanding the connection between programming skills and hacking abilities.
17- Python programming language: Understanding the features and uses of Python in both non-malicious and malicious hacking.
18- Introduction
19- Incident Response: Understanding the role and composite parts of Incident Response as a business function and how CERTS operate.
20- Aligned task/task forces for Business Continuity, Disaster Recovery, and Crisis Management.
21- Major computer incident investigations.
22- Laws and guidance in relation to the conduct of planned and structured major incident investigations
23- Introduction
24- Strategy and strategic management: Understand the concept of strategy, strategic management, planning, and buy-in in relation to cyber security.
25- Legislation, industry standards, training, and accreditations.
26- Implementation of security and risk management policies.
27- Future legal and technical environment: Understand the future legal and technical environment and its impact on cyber security.
28- Planning and designing a security audit: Understand how to plan and design a security audit for a cyber network.
29- Introduction
30- Threats and risks to traditional and emerging financial services.
31- Architectural structures of traditional and emerging financial markets.
32- Payments systems and their connection to underpinning financial services architecture.
33- Cryptocurrencies and their connection to underpinning financial services architecture.
noreply@uecampus.com
-->