Course in Cyber Security

Top Courses in Cyber Security

Cyber Security

A course is usually a class that can be taken in order to earn a certificate or work toward a degree. There are many different types of courses that may range from lasting a few hours to a few months in length. In today’s technological world, courses in cyber security can be particularly useful for the technologically savvy.

What is a course in cyber security? Cyber security has to do with protecting networks and information systems from intruders and malware. Many courses often start by addressing the fundamentals of operating systems, networking and systems administration. If a course is taken as part of a degree program, it may address topics such as digital forensics and security policy analysis and implementation. While a single course in cyber security is useful, it may be more beneficial when taken as part of a series of courses and working toward a degree.

Enrolling in cyber security courses is beneficial for anyone working with information systems in any form because it teaches about protection. Understanding how cyber security works can help individuals better protect personal and business information stored on electronic devices. These courses are often available online, making them ideal for distance and international learners.

The cost of enrolling in a cyber security course depends on the length of the course and where it is located. Interested students should research their program of choice carefully to understand the full cost of tuition and fees.

Most careers related to cyber security courses require some sort of degree. Students who build on their courses to complete a degree in cyber security may qualify for a variety of positions, such as security engineer, security analyst, information security manager, senior IT auditor and security administrator. While a single course is useful, earning a full degree is likely to make graduates more competitive in the field.

Cyber security is an increasingly important area of study. To learn more about such courses, search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

 

Read More

CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course

Simpliv
Online Full time Part time 7 hours Open Enrollment USA Fremont + 1 more

This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam. [+]

Welcome to CompTIA Cybersecurity Analyst CSA+ CS0-001. The Total Course from Total Seminars and Brent Chapman.

This course covers everything you need to know to pass your CompTIA CSA+ Certification (CS0-001) Exam. The first goal of the course is to make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

The course covers all the CompTIA CSA+ CS0-001 Objective Domains:

1.0 Threat Management: 27%

2.0 Vulnerability Management: 26%

3.0 Cyber Incident Response: 23%

4.0 Security Architecture and Tool Sets: 24%

Topics include: Threat and vulnerability management Conducting an analyzing reconnaissance Responding to network-based threats Securing a corporate network Cyber incident response Determining the impact of incidents Preparing the incident response toolkit ... [-]

CompTIA Security+ Certification (SY0-401): The Total Course

Simpliv
Online Full time Part time 13 - 14 hours Open Enrollment USA Fremont + 1 more

Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars. This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures. [+]

Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.

The course covers all the CompTIA Security+ SY0-401 Objective Domains:

1.0 Network Security: 20%

2.0 Compliance and Operational Security: 18%

3.0 Threats and Vulnerabilities: 20%

4.0 Application, Data and Host Security: 15%... [-]


3 day Cloud Security (CCSK) Course

International Management Forum Academy
Campus Full time 3 days January 2019 Netherlands Eindhoven

3-day training preparing you for the Certificate of Cloud Security Knowledge (CCSK), the industry's first vendor-independent Cloud Security certification from the Cloud Security Alliance (CSA) [+]

Cloud Security mode of Study Option 1: Public course 3-day Certification Programme Option 2: In-house training CCSK a solid foundation in Cloud Security issues and best practices

This 3-day training prepares you for the Certificate of Cloud Security Knowledge (CCSK) and covers all domain topics outlined by the Cloud Security Alliance (CSA) and the recommendations from the European Network and Information Security Agency (ENISA). The CCSK credential will provide foundational requirements for any future certifications that focus on specific professions, management or technical skills.

Cloud Security (CCSK) the industry's first Cloud Security certification

The CCSK is strongly supported by a broad coalition of experts and organisations from around the world. The collaboration between CSA and ENISA means that the world's two leading organisations for vendor-neutral Cloud Security research are providing the foundation for the industry's first Cloud Security certification.... [-]


Course: Cyber Security & Ethical Hacker Expert - Training Package (with CISA, CISSP, CISM, CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Master the skills needed to reach the highest levels of IT security professionalism and stand out from the crowd with this all-inclusive five course Cyber Security & Ethical Hacker Expert package. [+]

What are the objectives of this course?

The course includes all the materials needed to study towards obtaining the most recognized certifications in the industry: Certified Ethical Hacker (CEH)

Using enumeration to catalog system resources and potential routes to breach. Automated tools for breaching security including Trojans, backdoors, viruses, worms, and Denial of Service (DOS) attacks. The role of social engineering to steal confidential information directly from employees. Using sniffers and session hijacking to mask illegal access to system resources. Web-based attacks that can take online systems down. How wireless network security can be breached. How hackers avoid protective measures like IDS, firewalls, and honeypots. Using cryptography and steganography to protect data. How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate. ... [-]

Course: Cyber Security Expert - Training Package (with CISA, CISSP & CISM)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Master the advanced techniques required to protect network resources from the external threat with this Cyber Security Expert bundle. [+]

What are the objectives of this course?

This comprehensive package is made up of three of the world’s foremost IT security courses and will give you the knowledge needed to build and manage effective security solutions.

Certified Information Systems Auditor (CISA)

Information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements. Codifying IT service delivery and support mechanisms and levels to ensure systems and users remain fully productive. Identifying critical information assets and designing systems to protect from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure ... [-]

Course: Ethical Hacker Expert - Training Package (with CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package. [+]

What are the objectives of this course?

The package is split into two courses. The first of these courses are built around the Certified Ethical Hacker certification:

Understanding ethics involved in white hat hacking. How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. How to identify potential vulnerabilities. Enumeration Trojans, backdoors, viruses, worms, and Denial of Service (DoS) attacks. The role of social engineering to steal confidential information directly from employees. Sniffers and session hijacking Web-based attacks Wireless network security How hackers avoid protective measures like IDS, firewalls, and honeypots. Network forensic techniques Cryptography and steganography How to use the Metasploit toolkit to assess network protection measures. ... [-]

Course: CEH (Certified Ethical Hacking and Countermeasures) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Master the tools and techniques that hackers use to bypass security for your own corporate network defensive strategies with this Certified Ethical Hacking and Countermeasures course. [+]

What are the objectives of this course?

The knowledge gained in this course can help you to harden defenses and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment.

Intro to course Footprinting & Reconnaissance Scanning Networks Enumeration System Hacking Trojans & Backdoors Viruses & Worms Denial of Service Social Engineering Sniffers Session Hijacking Hacking Web servers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflows Cryptography Penetration Testing Who is it intended for?

This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques.... [-]


Course: CHFI (Computer Hacking Forensic Investigator) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Master the processes and tools required to investigate a serious security breach using industry-standard principles with this Computer Hacking Forensic Investigator (CHFI) course. [+]

What are the objectives of this course?

This course covers everything needed to investigate, document and prosecute a malicious security breach.

How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? ... [-]

Course: CompTIA Security+ 2014 (SY0-401) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Enter the IT security industry with the knowledge of the globally-recognised CompTIA best practice concepts in this course. [+]

What are the objectives of this course?

Learn the fundamentals of computer security with the vendor-neutral CompTIA Security+ course and live labs package where you will have 19 comprehensive modules to guide you through everything you’ll need to know to pass your exams. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own.

Network Terminology. Learn all you need to know about wireless. Introduction to security terminology. Identifying and satisfying compliance needs and policies for data security. Physical Security. Gain insight into disaster recovery, risk analysis, business continuity and business impact analysis. Introduction to Computer Forensics. Different types of attacks and system security threats and how they can be blocked. The use of encryption to protect data, even if it is intercepted by a third party. Cryptography Who is it intended for? ... [-]

Course: CIW Web Security Associate Training with Exam (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Learn the importance of network security, how to do it and get certified with an industry-recognized qualification from CIW with this CIW Security Associate course with the official exam. [+]

What are the objectives of this course?

The framework of this course will take students through the crucial knowledge that is needed to counteract any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future.

The examination is the 1D0-571 exam and consists of 62 questions that must be answered within a 90-minute time limit. In order to pass the course, candidates must achieve a minimum pass mark of 76%.

Understand how hacker threats occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorized activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards, and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain one step ahead when it comes to protecting your company’s needs. Who is it intended for? ... [-]

Course: CIW Web Security Associate Training (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Explore essential security principles that every IT security professional should know with this CIW Security Associate course. [+]

What are the objectives of this course?

The framework of this course will take students through the crucial knowledge that is needed to counteract any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future.

How hacker threat occurs and learns about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against the unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain one step ahead when it comes to protecting your company’s needs. Who is it intended for? ... [-]

Course: CIW Network Technology Associate Training with Exam (1D0-61C)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Get certified in the basic networking, internet and security protocols which are so vital to anyone who is looking to advance in the IT industry with this qualification from Certified Internet Web Professional (CIW). [+]

What are the objectives of this course?

Networking and internet security continue to grow in importance and this course gives students the ability to understand the key concepts of these exponentially crucial elements of a business. The CIW Network Technology Associate exam (1D0-61C) lasts for 30 minutes and contains 30 questions testing candidates’ knowledge of the content in the modules. To pass the exam, learners will need to achieve a score of 63.33%.

Essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking and network troubleshooting. Various network components and protocols that enable users to share data quickly and easily. Various types of transmission media and the ways that network architecture and topologies provide for efficient and secure communication. Open Systems Interconnection (OSI) reference model and its relationship to packet creation, plus the OSI model vs. the internet architecture model. Functions and features of internetworking server types and the benefits of implementing a Content Management System (CMS). Basic hardware and operating system maintenance procedures Mobile computing devices and the importance of RFC documents. Routing, IP addressing, IP address classes and subnet masks. Essential network security concepts, internet-based challenges facing today’s users and methods you can use to secure network and network transmissions, including authentication, encryption, and firewalls. Who is it intended for? ... [-]

Course: CIW Network Technology Associate Training (1D0-61C)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Master basic networking, internet and security protocols which are crucial to every modern business with this CIW Network Technology Associate course. [+]

What are the objectives of this course?

Networking and internet security continue to grow in importance and this course gives students the ability to understand the key concepts of these exponentially crucial elements of the business.

Essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking and network troubleshooting. Various network components and protocols that enable users to share data quickly and easily. Various types of transmission media and the ways that network architecture and topologies provide for efficient and secure communication. Open Systems Interconnection (OSI) reference model and its relationship to packet creation, plus the OSI model vs. the internet architecture model. Functions and features of internetworking server types and the benefits of implementing a Content Management System (CMS). Basic hardware and operating system maintenance procedures Mobile computing devices and the importance of RFC documents. Routing, IP addressing, IP address classes and subnet masks. Essential network security concepts, internet-based challenges facing today’s users and methods you can use to secure network and network transmissions, including authentication, encryption, and firewalls. Who is it intended for? ... [-]

Course - Ruby on Rails 5 Basics

Treehouse
Online Full time Part time Open Enrollment USA USA Online

In this course, we're going to set up a simple blogging app with just a handful of Rails commands. Then, we'll dive into what we've created and helped you really understand what's going on. We'll show you how to work with models, views, and controllers to quickly add new features to your app. By the end of this course, you'll be ready to create basic web apps in Rails. [+]

Ruby on Rails 5 Basics

In this course, we're going to set up a simple blogging app with just a handful of Rails commands. Then, we'll dive into what we've created and helped you really understand what's going on. We'll show you how to work with models, views, and controllers to quickly add new features to your app. By the end of this course, you'll be ready to create basic web apps in Rails.

What you'll learn

Creating Rails apps Models Views Controllers

Creating an App

We'll create a new Rails app and a simple resource. A resource is something you want users to be able to create, read, update, and delete instances of. With just a couple Rails commands, your site will be ready to run and fully interactive!... [-]


Delegate Superior Course On Data Protection

Instituto Universitario de Investigación Ortega y Gasset
Online Full time 4 months June 2019 Spain Madrid

The Superior Course of Delegate in Data Protection responds to the need to train the people who will assume the position of Delegate for Data Protection (DPD), a figure that emerges from the new General Data Protection Regulation (RGPD) which began to be applied on May 25, 2018. [+]

Basic information

Title: Senior Delegate Course on Data Protection

Own title: Instituto Universitario de Investigación Ortega y Gasset

Direction of the program: Álvaro Écija and Ricardo Llorente Hernán

Academic coordinator: Pedro Marcos García

Modality: online

Price: € 2,000

No. of seats: 35

Date of delivery: From June 25 to October 21 (with a stop in August).

Duration: 180 hours

Presentation and Objectives

The Superior Course of Delegate in Data Protection responds to the need to train the people who will assume the position of Delegate for Data Protection (DPD), a figure that emerges from the new General Data Protection Regulation (RGPD) which began to be applied on May 25, 2018.... [-]