Part time Course in Cyber Security in United Kingdom

Compare Part time Course Studies in Cyber Security in United Kingdom 2017

Cyber Security

Many reputable international universities and other educational institutions offer the opportunity for greater personal development via law courses. These courses discuss current issues and trends involved in such fields as intellectual property and regulatory theory.

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom and Britain, is a sovereign state located off the north-western coast of continental Europe.The two most famous (and oldest) universities are Oxford and Cambridge (often referred to as Oxbridge by many Britons) England also has several other world-class institutions, including several in London (notably Imperial College, the London School of Economics, University College London and King's College London, all are part of London University)

Request Information Best Part time Course Studies in Cyber Security in United Kingdom 2017

Read More

Course in Introduction to Cyber Security

FutureLearn
Online Part time 8 weeks October 2017 United Kingdom London

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life. [+]

Best Part time Course Studies in Cyber Security in United Kingdom. Course in Introduction to Cyber Security We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important. This free online course will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you. With cyber security often in the news today, the course will also frame your online safety in the context of the wider world, introducing you to different types of malware, including viruses and trojans, as well as concepts such as network security, cryptography, identity theft and risk management. Your guide for the course is Cory Doctorow, a visiting professor at The Open University. "If you want an introduction to the subject that provides an overview or to improve your own personal information security, it is an excellent course - enjoyable, informative, engaging and authoritative.” - Tony Morbin, Editor-in-Chief, SC Magazine Double accredited course This GCHQ Certified Training course is also accredited by the Institute of Information Security Professionals (IISP). It has been developed by The Open University with support from the UK Government’s National Cyber Security Programme and can be accessed free of charge. Requirements The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information. [-]

Course in Cyber Security: Safety at Home, Online, in Life

FutureLearn
Online Part time 3 weeks September 2017 United Kingdom London

The course will introduce you to some of the current key topics in cyber security research and show how they relate to everyday life. We’ll look at how the move to online storage of personal data affects privacy, how online payments can be made safely, and how the proliferation of “smart” devices affect security. [+]

Course in Cyber Security: Safety at Home, Online, in Life In the modern world, information security has an influence on all of us: at home, at work, online and in life in general. Like many inventions that have gone before, the internet and the web, the cloud and the Internet of Things (IoT) bring with them many advantages, but also open up new possibilities for criminal activity. So should you avoid all contact with this brave new world? This free online course presents an alternative, providing you with the knowledge to make informed decisions. Understand key topics in cyber security The course will introduce you to some of the current key topics in cyber security research and show how they relate to everyday life. We’ll look at how the move to online storage of personal data affects privacy, how online payments can be made safely, and how the proliferation of “smart” devices affect security. Over the three weeks of the course we will look at these topics from different perspectives: the user’s, a potential attacker’s and a business’s. We’ll also discuss how research underway at Newcastle University addresses these topics. Privacy online: What is privacy? We begin by looking into our own beliefs and practices when it comes to giving out our data online. What is the value of our personal data to businesses? And how can you find out what information about you is readily available online? Payment safety: We make payments everyday, we purchase items at the store and we purchase items online, but how secure are these payments? How safe is our money? All of the different methods of payment cash, credit/debit card, cheque and bitcoin are a trade-off between security and convenience. We will look at constantly evolving race between the payment fraud and the security measures employed to prevent fraud. Security at home: With increasing numbers of autonomous, internet-enabled devices in our homes and cars, on our wrists and in our clothes, how could they be misused? And what can we do about understanding and responding to the risks and threats? Learn from cyber security researchers and practitioners The course is presented by researchers and practitioners from Newcastle University’s School of Computing Science, an acknowledged Academic Centre of Excellence in Cyber Security Research (ACE-CSR). The team conduct research in areas such as cryptography and information assurance with a focus on understanding the human element of cyber security - victims, investigators and attackers. Each topic is led by a research expert in that field. Requirements The course is suitable for people who have some knowledge of cyber security, some IT background and an interest in finding out the state of practice in cyber security as well as future research directions. [-]

Cyber Security Expert - Training Package (with CISA, CISSP & CISM)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the advanced techniques required to protect network resources from external threat with this Cyber Security Expert bundle. [+]

Best Part time Course Studies in Cyber Security in United Kingdom. What are the objectives of this course? This comprehensive package is made up of three of the world’s foremost IT security courses and will give you the knowledge needed to build and manage effective security solutions. Certified Information Systems Auditor (CISA) Information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements. Codifying IT service delivery and support mechanisms and levels to ensure systems and users remain fully productive. Identifying critical information assets and designing systems to protect from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure Certified Information Systems Security Professional (CISSP) The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system. Telecommunications and network systems that need to be hardened to prevent data loss or theft. The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems. The importance of secure software architecture and design to help ensure that in-house systems protect data and resources. Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys. Using security architecture and design principles to limit data access and potential angles of attack. Monitoring, auditing and improving operations security to keep systems secure at the point of access. Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage. Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation. Physical and environmental security considerations Certified Information Security Manager (CISM) Establishing and maintaining an information security governance frameworks and processes required to support it. How to manage information risks to an acceptable level. Build, implement and operate an information security program that aligns with the wider information security strategy. Planning the correct response to information security incidents. Who is it intended for? This bundle is ideal for IT professionals who are responsible for audit, control and security of corporate computer and networking resources. It is also suitable for individuals who need to achieve an industry-recognised qualification. Requirements There are no official pre-requisites for the CISA or CISM courses but CISSP requires students to have at least five years of recent full-time professional work experience in at least 2 of the 8 domains of CISSP. What marks this course apart? Once students have taken this package they will be eligible to sit the respective examinations. When the course has been completed they will have the relevant knowledge to function in roles such as security architect, lead auditing manager and security systems engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Ethical Hacker Expert - Training Package (with CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package. [+]

What are the objectives of this course? The package is split into two courses. The first of these courses is built around the Certified Ethical Hacker certification: Understanding ethics involved in white hat hacking. How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. How to identify potential vulnerabilities. Enumeration Trojans, backdoors, viruses, worms and Denial of Service (DoS) attacks. The role of social engineering to steal confidential information directly from employees. Sniffers and session hijacking Web-based attacks Wireless network security How hackers avoid protective measures like IDS, firewalls and honeypots. Network forensic techniques Cryptography and steganography How to use the metasploit toolkit to assess network protection measures. The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through: How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is equally able to satisfy the demands of anyone who is looking to better understand hacking techniques so that can protect their, or their clients, resources. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course they will be ready to sit their CHFI EC0 312-49 & 312-50 exams. You will have the knowledge to function in roles such as ethical hacker, cyber security, penetration tester and information security analyst. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CEH (Certified Ethical Hacking and Countermeasures) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the tools and techniques that hackers use to bypass security for your own corporate network defensive strategies with this Certified Ethical Hacking and Countermeasures course. [+]

Best Part time Course Studies in Cyber Security in United Kingdom. What are the objectives of this course? The knowledge gained in this course can help you to harden defences and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment. Intro to course Footprinting & Reconnaissance Scanning Networks Enumeration System Hacking Trojans & Backdoors Viruses & Worms Denial of Service Social Engineering Sniffers Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflows Cryptography Penetration Testing Who is it intended for? This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques. Requirements There are no pre-requisites for this course. What marks this course apart? Once you have completed this course you will be able to sit the Certified Ethical Hacking Certification 312-50 examination. Students will be able to function in roles such as ethical hacker, cyber security and penetration tester. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CHFI (Computer Hacking Forensic Investigator) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the processes and tools required to investigate a serious security breach using industry-standard principles with this Computer Hacking Forensic Investigator (CHFI) course. [+]

What are the objectives of this course? This course covers everything needed to investigate, document and prosecute a malicious security breach. How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is ideal for anyone who has looking to build on their foundational ethical hacking skills. Requirements There are no official pre-requisites for this course but we recommend students have a basic knowledge of computer security and ethical hacking. What marks this course apart? Once students have completed this course they will be ready to sit their CHFI EC0 312-49 exam. Candidates will be able to function in roles such as forensic analyst, security analyst and information security analyst. These jobs usually average a salary of £27,000 a year. Source: PayScale What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CompTIA Security+ 2014 (SY0-401) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Enter the IT security industry with the knowledge of the globally-recognised CompTIA best practice concepts in this course. [+]

Best Part time Course Studies in Cyber Security in United Kingdom. What are the objectives of this course? Learn the fundamentals of computer security with the vendor-neutral CompTIA Security+ course and live labs package where you will have 19 comprehensive modules to guide you through everything you’ll need to know to pass your exams. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. Network Terminology. Learn all you need to know about wireless. Introduction to security terminology. Identifying and satisfying compliance needs and policies for data security. Physical Security. Gain insight into disaster recovery, risk analysis, business continuity and business impact analysis. Introduction to Computer Forensics. Different types of attacks and system security threats and how they can be blocked. The use of encryption to protect data, even if it is intercepted by a third party. Cryptography Who is it intended for? Anyone who is looking to enter the world of IT security or any IT professional who is looking to upskill. Requirements There are no pre-requisites for this course. What marks this course apart? This qualification will provide you with all the knowledge you need to go into roles such as security architect, security administrator or security engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Web Security Associate Training with Exam (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Learn the importance of network security, how to do it and get certified with an industry-recognised qualification from CIW with this CIW Security Associate course with the official exam. [+]

What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. The examination is the 1D0-571 exam and consists of 62 questions that must be answered in a 90 minute time limit. In order to pass the course, candidates must achieve a minimum pass mark of 76%. Understand how hacker threats occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is designed for anyone who works within the network security field or anyone who is looking to go into the industry with a certification to back up their knowledge and give themselves a career boost. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed and passed the course and examination respectively, they will be able to function in roles such as systems administrator, network server administrator and firewall administrator. This course can also go hand-in-hand with other network and computing security courses to provide a well-rounded subject knowledge. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Web Security Associate Training (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Explore essential security principles that every IT security professional should know with this CIW Security Associate course. [+]

Best Part time Course Studies in Cyber Security in United Kingdom. What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. How hacker threat occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is for IT security professionals who want to study towards an industry-recognised certification, it is also for people who want to switch industries and go into IT security. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course, they are eligible to sit the 1D0-571 examination. They will be able to function in roles such as systems administrator, network server administrator and firewall administrator. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW JavaScript Specialist Training with Exam (1D0-635)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Get certified and show potential employers that you have the necessary skills in the most in-demand programming language with this CIW JavaScript Specialist course and exam package. [+]

What are the objectives of this course? The course will equip students with the vital skills necessary to use the JavaScript language to design client-side, platform-independent solutions. The exam consists of a 90 minute time limit in which students have to answer 55 questions. A minimum pass mark of 75% must be achieved to gain certification. An introduction to scripting, typical JavaScript characteristics and client-side vs server-side applications. How to communicate with users, work with variables and data in JavaScript and produce interactive applications. How to control program flow and cover the decisional program flow. Popular JavaScript language objects and how to validate interactive flows. Build up a working knowledge of security issues such as dealing with malicious and accidental coding, creating secure code for cookies, script blocking and cross-site scripting (XSS). Explore what it takes to create animated images and other custom objects needed to build dynamic web applications. How to amend X/HTML on the fly. Any copyright issues in relation to JavaScript technology. Who is it intended for? This course is for people with little to no knowledge of programming who want to get into the industry, or for programming professionals who are looking to provide certified proof that they are capable of carrying out advanced tasks. Requirements There are no pre-requisites for this course. What marks this course apart? Students who pass this course will be able to function in roles such as web programmer, programming analyst and front-end developer. The course goes hand-in-hand with other CIW learning programmes and can also be combined with other programming languages such as C++, PHP and Python to add more skills to your CV. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW JavaScript Specialist Training (1D0-635)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Learn the essential skills needed to become an in-demand JavaScript developer with this sought-after training programme from Certified Internet Webmaster Professional (CIW). [+]

Best Part time Course Studies in Cyber Security in United Kingdom. What are the objectives of this course? The course will equip students with the vital skills necessary to use the JavaScript language to design client-side, platform-independent solutions. An introduction to scripting, typical JavaScript characteristics and client-side vs server-side applications. How to communicate with users, work with variables and data in JavaScript and produce interactive applications. How to control program flow and cover the decisional program flow. Popular JavaScript language objects and how to validate interactive flows. Build up a working knowledge of security issues such as dealing with malicious and accidental coding, creating secure code for cookies, script blocking and cross-site scripting (XSS). Explore what it takes to create animated imager and other customer objects needed to build dynamic web applications. How to amend X/HTML on the fly. Any copyright issues in relation to JavaScript technology. Who is it intended for? This course is for anyone who is looking to build up knowledge in and fully understand the world’s most popular programming language, JavaScript. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course they will be eligible to sit the 1D0-635 examination. They will be able to function in roles such as web programmer, programming analyst, and front-end developer. The course also goes hand-in-hand with other CIW learning programmes. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Network Technology Associate Training with Exam (1D0-61C)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Get certified in the basic networking, internet and security protocols which are so vital to anyone who is looking to advance in the IT industry with this qualification from Certified Internet Web Professional (CIW). [+]

What are the objectives of this course? Networking and internet security continue to grow in importance and this course gives students the ability to understand the key concepts of these exponentially crucial elements of business. The CIW Network Technology Associate exam (1D0-61C) lasts for 30 minutes and contains 30 questions testing candidates’ knowledge of the content in the modules. To pass the exam, learners will need to achieve a score of 63.33%. Essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking and network troubleshooting. Various network components and protocols that enable users to share data quickly and easily. Various types of transmission media and the ways that network architecture and topologies provide for efficient and secure communication. Open Systems Interconnection (OSI) reference model and its relationship to packet creation, plus the OSI model vs. the internet architecture model. Functions and features of internetworking server types and the benefits of implementing a Content Management System (CMS). Basic hardware and operating system maintenance procedures Mobile computing devices and the importance of RFC documents. Routing, IP addressing, IP address classes and subnet masks. Essential network security concepts, internet-based challenges facing today’s users and methods you can use to secure network and network transmissions, including authentication, encryption and firewalls. Who is it intended for? Anyone who wants to gain a mastery of the core concepts of computer networking and security whilst also having the qualification to prove the knowledge obtained. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have taken this course they will be able to function in roles such as network support, support specialist and network technician. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Network Technology Associate Training (1D0-61C)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master basic networking, internet and security protocols which are crucial to every modern business with this CIW Network Technology Associate course. [+]

Best Part time Course Studies in Cyber Security in United Kingdom. What are the objectives of this course? Networking and internet security continue to grow in importance and this course gives students the ability to understand the key concepts of these exponentially crucial elements of business. Essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking and network troubleshooting. Various network components and protocols that enable users to share data quickly and easily. Various types of transmission media and the ways that network architecture and topologies provide for efficient and secure communication. Open Systems Interconnection (OSI) reference model and its relationship to packet creation, plus the OSI model vs. the internet architecture model. Functions and features of internetworking server types and the benefits of implementing a Content Management System (CMS). Basic hardware and operating system maintenance procedures Mobile computing devices and the importance of RFC documents. Routing, IP addressing, IP address classes and subnet masks. Essential network security concepts, internet-based challenges facing today’s users and methods you can use to secure network and network transmissions, including authentication, encryption and firewalls. Who is it intended for? Anyone who is looking to master the fundamentals of computer networking, whether that be to upskill professionally or personally. Requirements There are no pre-requisites for this course. What marks this course apart? Once you have taken this course, you will be eligible to sit the CIW – Network Technology Associate exam (1D0-61C). Students who pass this course can usually function in roles such as network support, support specialist and network technician. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]