Cyber Security

Cyber Security (CSN1)

Learn to protect systems and data from cyber threats and attacks.

Course Overview:

This 12-unit course developed by the Read Academy, KSA incorporates a thorough overview of Cyber Security.

Behind every successful coder there is a successful de-coder – yes, that’s why hackers win. While Cryptology remains the science of studying & breaking the secrecy of the encryption processes etc, it the ‘motivation’ of the cyberpunks that is quintessential to the win best depicted in the Oscar winner ‘The Imitation Game’.

Welcome to the world of virtual reality wherein every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.

With our Cyber Security workshop participants will understand the different types of malware and security breaches. Develop effective prevention methods which will increase overall security. They will also understand the basic concepts associated with Cryptography, Hardware Security Modules, Key Management, different types of malware and security breaches, types of cyberattack and what a company needs to stay secure.

The course is offered in an online platform similar to an interactive textbook, featuring pre-recorded videos, quizzes and projects that give you the opportunity to gain new knowledge, learn new skills and demonstrate these through the completion of online assessment and skill evidence.

Those who successfully complete this course will be able to incorporate their learning into their current workplace and be formally recognised with a Certificate of Completion endorsed by the Read Academy.

Key Objectives Of The Course:

  • Understand different types of malware and security breaches 
  • Know the types of cyber attacks to look out for 
  • Develop effective prevention methods 

12 Modules

Objective Certificate
Follow the suggested order or choose your own. Designed to help you practice and apply the skills you learn Highlight your new skills on your resume or LinkedIn.

 

Course Outline:

Module One: Getting Started

  • Icebreaker
  • Housekeeping Items
  • The Parking Lot
  • Workshop Objectives                                                          

Module Two: Cyber Security Fundamentals

  • What is Cyberspace
  • What is Cyber Security
  • Why is Cyber Security Important
  • What is a Hacker
  • Case Study
  • Review Questions

Module Three: Types of Malware

  • Worms
  • Viruses
  • Spyware
  • Trojans
  • Case Study
  • Review Questions

Module Four: Cyber Security Breaches

  • Phishing
  • Identity Theft
  • Harassment
  • Cyberstalking
  • Case Study
  • Review Questions

Module Five: Types of Cyber Attacks

  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Penetration Testing
  • Case Study
  • Review Questions

Module Six: Prevention Tips

  • Craft a strong password
  • Two-step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study
  • Review Questions

Module Seven: Mobile Protection

  • No Credit Card Numbers
  • Don’t Save Passwords
  • No Personalized Contacts Listed
  • Case Study
  • Review Questions

Module Eight: Social Network Security

  • Don’t Reveal Location
  • Keep Birthdate Hidden
  • Have Private Profile
  • Don’t Link Accounts
  • Case Study
  • Review Questions

Module Nine: Prevention Software

  • Firewalls
  • Virtual Private Networks
  • Anti-Virus & Anti-Spyware
  • Routine Updates
  • Case Study
  • Review Questions

Module Ten: Critical Cyber Threats

  • Critical Cyber Threats
  • Cyber terrorism
  • Cyberwarfare
  • Cyber-Espionage
  • Case Study
  • Review Questions

Module Eleven: Defense Against Hackers

  • Cryptography
  • Digital Forensics
  • Legal Recourse
  • Case Study
  • Review Questions

Module Twelve: Wrapping up

  • Words from the Wise
  • Review of Parking Lot
  • Lessons Learned
  • Completion of Action Plans and Evaluations

All of these professional training resources are based on the most up-to-date body of knowledge and carefully selected by subject matter experts. 

  • Introduction
  • Getting Started
  • Cyber security Fundamentals
  • Types of Malware
  • Cyber Security Breaches
  • Types of Cyber Attacks
  • Prevention Tips
  • Mobile Protection
  • Social Network Security
  • Prevention Software
  • Critical Cyber Threats
  • Defense Against Hackers
  • Wrapping Up
  • Download Certificate

Student Reviews

Feedback from students who have taken this course.

$49.00

Responsive on Mobile

This course contains:

  • 14 units
  • Completion Certificate
Enroll Now