Course in Cyber Security

Top Courses in Cyber Security

Cyber Security

A course is usually a class that can be taken in order to earn a certificate or work toward a degree. There are many different types of courses that may range from lasting a few hours to a few months in length. In today’s technological world, courses in cyber security can be particularly useful for the technologically savvy.

What is a course in cyber security? Cyber security has to do with protecting networks and information systems from intruders and malware. Many courses often start by addressing the fundamentals of operating systems, networking and systems administration. If a course is taken as part of a degree program, it may address topics such as digital forensics and security policy analysis and implementation. While a single course in cyber security is useful, it may be more beneficial when taken as part of a series of courses and working toward a degree.

Enrolling in cyber security courses is beneficial for anyone working with information systems in any form because it teaches about protection. Understanding how cyber security works can help individuals better protect personal and business information stored on electronic devices. These courses are often available online, making them ideal for distance and international learners.

The cost of enrolling in a cyber security course depends on the length of the course and where it is located. Interested students should research their program of choice carefully to understand the full cost of tuition and fees.

Most careers related to cyber security courses require some sort of degree. Students who build on their courses to complete a degree in cyber security may qualify for a variety of positions, such as security engineer, security analyst, information security manager, senior IT auditor and security administrator. While a single course is useful, earning a full degree is likely to make graduates more competitive in the field.

Cyber security is an increasingly important area of study. To learn more about such courses, search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

 

Read More

Data Security (Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2018 United Kingdom Cambridge

This course equips you with the practical knowledge to securely manage personal data as defined in the General Data Protection Regulations. It requires a basic understanding of web-based systems and networking, level 3 BTEC or higher. You will learn how to assess vulnerabilities to a known IT system and how to reduce those threat vectors. [+]

About this course

This course equips you with the practical knowledge to securely manage personal data as defined in the General Data Protection Regulations. It requires a basic understanding of web-based systems and networking, level 3 BTEC or higher. You will learn how to assess vulnerabilities to a known IT system and how to reduce those threat vectors.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:

Understand the requirement for security governance and the legal aspects of cyber security as it applies to an IT system Identify the type of vulnerabilities and threat vectors to an IT system Suggest the cyber control required to reduce the threat vectors Understand the implication of various strategies used in mitigation of a cyber-attack. Understand the security architecture of an organization Conduct a vulnerability assessment Syllabus ... [-]

Data Security (Non-Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2018 United Kingdom Cambridge

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment. [+]

About this course

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:... [-]


CISSP Prep Class

University of Fairfax
Online May 2018 USA Washington Four

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits) [+]

IA7000 Security in the Digital Age

In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

Join the Cybersecurity Elite U of F Cybersecurity Education Path

Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.... [-]


Fundamentals Of Ethical Hacking: Practical Course

Udemy
Online Part time 21 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

How to learn to complete a complete PenTest by means of several practical examples [+]

How to learn to perform a complete PenTest through several practical examples.

What will I learn? Understand the importance of professional Ethical Hacker in the job market; Understand the legal aspects of the profession of Pentester; Develop skills in linux environments and understand the operation of TCP / IP stack protocols; Understand the types of invasion testing and when to apply them; To know techniques of exploration of failures in computational environments. Perform a Penetration Test, fulfilling all the necessary technical steps; Understand the types of documentation that should be delivered to the customer at the end of the Penetration Test. Requirements You should already be familiar with the basics of networking and operating systems Description ... [-]

Basics Of Professional Ethical Hacking

Udemy
Online Part time 5 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

I take you from scratch, step by step so you understand the Security [+]

I take you from scratch, step by step so that you understand Security.

What will I learn? The importance of Information Security. Elements that make up Security. Several facets in the Hacking cycle. The types of Hacker attacks. The Hacktivism. Ethical Hacking The search for vulnerabilities and their tools. Steps to conduct the Ethical Hacking. Computer crimes and their implications. The Cyberleyes that prevail around the world. Requirements  Basic PC management. Description

In this first part of my course on the Fundamentals of Ethical Hacking, of a Professional nature, you will learn the following.

The importance of security in the current times (analysis of real cases). Essential terminologies and case studies. All the elements of which Security is composed (confidentiality, authenticity, integrity, availability). The types of Hackers (Ethical, black hat, gray hat, formerHackers). The phases used by an attacker in the Hacking cycle (scanning, hoovering, enumeration, gaining access, housekeeping or maintaining access). We will see all the types of attacks that are known (to the operating system, by code reduction, at the application level, by configuration error). We will define what is understood by Hacktivism and we will give real examples. Ethical Hacking (profile of skills, types of approach, how to become one). Search for vulnerabilities and tools (research, fuzzing, 0-day). Conducting Ethical Hacking (types of reports, carte blanche, holy grail, pit type). Computer crimes and their implications. Who is it for? Anyone interested in Security and its deficiencies. Program of this course Introduction Terms and elements that make up... [-]

Ethical Hacking: The Complete Course

Udemy
Online Part time 9 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn the basics of computer security to protect yourself from cyber attacks. [+]

Learn the basics of computer security to protect yourself from cyber attacks.

What will I learn? Understand the methods and tools used to hack you to defend and defeat them. Secure computer systems, networks, and websites. Create your own test lab to practice without breaking. Understand how systems, networks and computing work in general. Detect computer vulnerabilities in your computer systems, and fix them. Acquire you too this essential knowledge in the years to come in view of the growing number of cyberattacks. Take your digital life in hand, by updating you technically. Teach you the basics of computer security you have learned. Prepare yourself for jobs in the field of information systems security, or certifications like CEH (Certified Ethical Hacker) Discover a new world, the mysterious face of IT, and put your skills to the benefit of those around you or your customers. And many others... requirements You must have some basic computer skills. You must have a Windows or Linux machine (Mac has not been tested). But you must above all be in a good mood and want to learn! Description ... [-]

Hacking With Nmap: Portscanning And Vulnerability Analysis

Udemy
Online Part time 8 hours September 2018 USA USA Online Turkey Turkey Online Ireland Ireland Online + 4 more

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities [+]

Learn how to make the most of the hacking tool Nmap for scanning networks and detecting vulnerabilities.

What will I learn?Use Host Discovery to discover active systems on the networkUse the different portscan types to identify open ports and servicesDetermine software and version of services and operating systemsOptimize an Nmap scanWork around firewalls and IDS / IPS with NmapUse NSE and Nmap scripts specifically and develop them yourselfUse additional tools such as Zenmap, ncat and ndiff effectivelyconditionsYou should have a solid basic knowledge of networkingWindows, Linux and TCP / IP should not be foreign words for youNo profound knowledge of TCP / IP is required, all necessary information is provided in the courseA high motivation and affinity to the topic networkdescription... [-]

Course in Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks

FutureLearn
Online Part time 2 weeks November 2018 United Kingdom UK Online

Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening. [+]

Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening.

In this course, you’ll explore some of the common cyber threats facing small and medium enterprises, what a cyber attack means, and what practical tools and strategies you can put in place to prevent them.

Investigate a real cyber attack in action

We’ll start by looking at the recent Panama Papers leak to find out more about cyber threats, the methods that hackers use, and what the consequences of cyber attacks can be for small and medium enterprises.

Explore strategies for protecting your organisation against cyber attacks After viewing a simulation of a cyber attack in action, we’ll then take a look at some of the tools and preventative strategies that you can put in place to protect your organisation.... [-]


Course in Introduction to Cyber Security

FutureLearn
Online Full time Part time 8 weeks May 2018 United Kingdom UK Online + 1 more

Our lives depend on online services. Gain essential cybersecurity knowledge and skills, to help protect your digital life. [+]

Why join the course?

This online course will help you understand online security and protect your digital life, whether at home or work.

Guided by Cory Doctorow, you will learn how to recognize threats that could harm you online and take steps to reduce the chances that they happen to you.

The course will frame your online safety in the context of the wider world, introducing concepts like malware, viruses, trojans, network security, cryptography, identity theft and risk management.

The course is supported by the UK Government’s National Cyber Security Programme, is GCHQ Certified Training and IISP accredited.

What topics will you cover?

Threat landscape: terminology, cybersecurity threats, keeping up to date Authentication: access control, passwords, two-factor authentication Malware: types of malware, attack vectors, preventing infection Networking and communications: fundamentals, security challenges, standards Cryptography: symmetric and asymmetric cryptography, applications Network security: firewalls, virtual private networks, intrusion detection/prevention When your defences fail: cybersecurity laws, recovering from attacks Managing security risks: risk analysis and management ... [-]

Course in Cyber Security: Safety at Home, Online, in Life

FutureLearn
Online Full time Part time 3 weeks November 2018 United Kingdom UK Online + 1 more

This three-week free online course explores practical cybersecurity including privacy online, payment safety and security at home

[+]

This three-week free online course explores practical cybersecurity including privacy online, payment safety and security at home.

Why join the course?

In the modern world, information security has an influence on all of us: at home, at work, online and in life in general. Like many inventions that have gone before, the internet and the web, the cloud and the Internet of Things (IoT) bring with them many advantages, but also open up new possibilities for criminal activity. So should you avoid all contact with this brave new world? This free online course presents an alternative, providing you with the knowledge to make informed decisions.

Understand key topics in cybersecurity ... [-]

CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

Simpliv
Online Full time Part time 7 hours Open Enrollment USA Fremont + 1 more

This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam. [+]

Welcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman.

This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

The course covers all the CompTIA CSA+ CS0-001 Objective Domains:

1.0 Threat Management: 27%

2.0 Vulnerability Management: 26%

3.0 Cyber Incident Response: 23%

4.0 Security Architecture and Tool Sets: 24%

Topics include: Threat and vulnerability management Conducting an analyzing reconnaissance Responding to network-based threats Securing a corporate network Cyber incident response Determining the impact of incidents Preparing the incident response toolkit ... [-]

CompTIA Security+ Certification (SY0-401): The Total Course

Simpliv
Online Full time Part time 13 - 14 hours Open Enrollment USA Fremont + 1 more

Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars. This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures. [+]

Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.

The course covers all the CompTIA Security+ SY0-401 Objective Domains:

1.0 Network Security: 20%

2.0 Compliance and Operational Security: 18%

3.0 Threats and Vulnerabilities: 20%

4.0 Application, Data and Host Security: 15%... [-]


3 day Cloud Security (CCSK) Course

International Management Forum Academy
Campus Full time 3 days January 2019 Netherlands Eindhoven

3-day training preparing you for the Certificate of Cloud Security Knowledge (CCSK), the industry's first vendor-independent Cloud Security certification from the Cloud Security Alliance (CSA) [+]

Cloud Security mode of Study Option 1: Public course 3-day Certification Programme Option 2: In-house training CCSK a solid foundation in Cloud Security issues and best practices

This 3-day training prepares you for the Certificate of Cloud Security Knowledge (CCSK) and covers all domain topics outlined by the Cloud Security Alliance (CSA) and the recommendations from the European Network and Information Security Agency (ENISA). The CCSK credential will provide foundational requirements for any future certifications that focus on specific professions, management or technical skills.

Cloud Security (CCSK) the industry's first Cloud Security certification

The CCSK is strongly supported by a broad coalition of experts and organisations from around the world. The collaboration between CSA and ENISA means that the world's two leading organisations for vendor-neutral Cloud Security research are providing the foundation for the industry's first Cloud Security certification.... [-]


Course: CISA Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Simplilearn’s CISA certification training is aligned to ISACA and ensures that you ace the exam on your first attempt. The training will enhance your understanding of IS audit processes and also help you understand how to protect information systems.

[+]

Key features 32 hours of instructor-led training 40 hours of self-paced videos 5 simulation exams for practice 10 industry-based case studies 5 domain-wise test papers to prepare you for CISA certification Course description

What’s the focus of this course? Simplilearn’s CISA certification training is aligned to ISACA and ensures that you ace the exam in your first attempt. The training will enhance your understanding of IS audit processes and also help you understand how to protect information systems. What are the course objectives? By the end of this training, you will:

Be able to identify and assess vulnerabilities, and report on compliance and institutional controls. Acquire the relevant knowledge and skills required to clear the CISA certification exam by ISACA. Gain a better understanding of IS audit and assurance guidelines, standards, and best practices for IS audit and control, governance of enterprise IT, acquisition, development, testing, and implementation of information systems. Develop working knowledge of the five domains of CISA, as prescribed by ISACA. ... [-]

Course: CISSP Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Simplilearn’s CISSP certification training is aligned to the (ISC) ² CBK 2015 and trains you in the industry’s latest best practices, which will help you ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards. [+]

Key features 32 hours of instructor-led training 32 hours of self-paced videos 5 simulation exams (250 questions each) for practice Offers the requisite 30 CPEs for taking the CISSP examination 8 domain-specific test papers (10 questions each) to prepare you for CISSP certification 98.6% pass rate Course description

What’s the focus of this course? Simplilearn’s CISSP certification training is aligned to the (ISC)² CBK 2015 and trains you in the industry’s latest best practices, which will help you ace the exam on the first attempt. The certification helps you develop the expertise in defining the architecture, in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards. What are the course objectives? By the end of this training, you will:... [-]