• LOGIN
  • No products in the cart.

The [course_title] course is designed to help you to understand the cyber-attacks. The purpose of the course is to help you to analyse threats, secure design computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents.  The course also prepares you for the CyberSec First Responder certification Exam.

The course covers the detailed overview of Wireless Communications including Assess Risk, Mitigate Risk and Integrating Documentation into Risk Management. The course teaches you the tools and techniques to manage cyber-security risks and helps you to identify various types of common threats so that you can evaluate your organisation’s security. In short, the course helps you to respond to security threats and operate a system and network security analysis.

Course Highlights

  • Internationally recognised accredited certification on successful completion
  • Free accredited e-certificate
  • Study at your own pace, anytime and anywhere
  • Access to all courses with a monthly membership plan of £29
  • High quality video and text course materials
  • Efficient exam system, assessment and instant results
  • Improve your chance of gaining professional skills and better earning potential
  • Eligibility for NUS Extra card which gives you a discount from thousands of retailers

Requirements

There is no experience or previous qualifications required for enrolment on this course. It is available to all students of all academic backgrounds.

Assessment and Certification

You can test your learning as you progress through the course by undertaking mock tests. On completion of the course, there will be an assessment consisting of multiple choice questions for which the pass mark is 60%. On passing, you will gain instant access to your e-certificate.  PDF and hard copy certificates can be ordered for an additional fee.

  • PDF Certificate – £9
  • Hardcopy by Post- £19
  • Both PDF and Hardcopy – £24

Tutor Support

With all our courses, you will receive access to dedicated tutors and technical support. You will also be provided with unlimited email, phone and live chat support to help answer any questions you might have whilst studying the course.

Course Compatibility

All our courses are fully compatible with PC’s, Mac’s, tablets and smartphones.

Career Path

Completing this course will help you to increase your knowledge and improve your skills and instil in you the confidence to progress. You will also be able to add your qualification to your CV, enhance your career and become more competitive within your chosen industry.

Course Curriculum

Overview of Wireless Communications
Identify the Importance of Risk Management 00:11:00
Assess Risk 00:13:00
Mitigate Risk 00:22:00
Integrate Documentation into Risk Management 00:14:00
Analyzing the Threat Landscape
Classify Threats and Threat Profiles 00:07:00
Perform Ongoing Threat Research 00:12:00
Resources that Aid in Research of Threats 00:03:00
Analyzing Recon Threats to Computing and Network Environments
Implement Threat Modeling 00:09:00
Assess the Impact of Reconnaissance Incidents 00:10:00
Performing Reconnaissance on a Network 00:07:00
Examining Reconnaissance Incidents 00:08:00
Assess the Impact of Social Engineering 00:10:00
Assessing the impact of Social Engineering 00:07:00
Assessing the Impact of Phishing 00:03:00
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks 00:10:00
Cracking Passwords Using a Password File 00:08:00
Assess the Impact of Web Based Attacks 00:11:00
Assessing the Impact of Web-Based Threats 00:03:00
Assess the Impact of Malware 00:08:00
Malware Detection and Removal 00:05:00
Assess the Impact of Hijacking and Impersonation Attacks 00:13:00
Assess the Impact of DoS Incidents 00:09:00
Assessing the Impact of DoS Attacks 00:04:00
Assess the Impact of Threats to Mobile Security 00:08:00
Assess the Impact of Threats to Cloud Security 00:10:00
Analyzing Post-Attack Techniques
Assess Command and Control Techniques 00:08:00
Assessing Command and Control Techniques 00:10:00
Assess Persistence Techniques 00:05:00
Detecting Rootkits 00:03:00
Assess Lateral Movement and Pivoting Techniques 00:13:00
Assess Data Exfiltration Techniques 00:04:00
Steganography 00:03:00
Assess Anti Forensics Techniques 00:09:00
Assessing Anti-Forensics 00:03:00
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments 00:16:00
Perform a Vulnerability Scan with Nessus 00:07:00
Perform a Vulnerability Scan with MBSA 00:05:00
Conduct Penetration Tests on Network Assets 00:18:00
Follow Up on Penetration Testing 00:06:00
Collecting Cyber security Intelligence
Deploy a Security Intelligence Collection and Analysis Platform 00:19:00
Collect Data from Network Based Intelligence Sources 00:15:00
Collecting Network-Based Security Intelligence 00:07:00
Collect Data from Host Based Intelligence Sources 00:13:00
Collecting Host-Based Security Intelligence 00:15:00
Parsing Log files 00:03:00
Analyzing Log Data
Use Common Tools to Analyze Logs 00:22:00
Analyzing Linux Logs for Security Intelligence 00:08:00
Use SIEM Tools for Analysis 00:07:00
Incorporating SIEMs into Security Intelligence Analysis 00:18:00
Parse Log Files with Regular Expressions 00:25:00
Performing Active Asset and Network Analysis
Analyze Incidents with Windows-Based Tools 00:17:00
Windows-Based Incident Analysis Tools 00:19:00
Analyze Incidents with Linux Based Tools 00:05:00
Linux-Based Incident Analysis Tools 00:07:00
Analyze Malware 00:11:00
Analyzing Malware 00:03:00
Analyze Indicators of Compromise 00:20:00
Analyzing Indicators of Compromise 00:15:00
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture 00:22:00
Mitigate Incidents 00:16:00
Hardening Windows Servers 00:14:00
DNS Filtering 00:05:00
Blacklisting and Whitelisting 00:09:00
Prepare for Forensic Investigation as a CSIRT 00:03:00
Investigating Cyber security Incidents
Apply a Forensic Investigation Plan 00:10:00
Securely Collect and Analyze Electronic Evidence 00:08:00
Securely Collecting Electronic Evidence 00:05:00
Analyzing Forensic Evidence 00:07:00
Follow Up on the Results of an Investigation 00:04:00
Mock Exam
Final Exam

Course Reviews

4.7

4.7
6 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE

....

Instructors

484 STUDENTS ENROLLED

APPROVED COURSE CENTRE

 

Approved Course Centre CPDQS

Alpha-Academy-Certificate-Mockup13

Our Students Say..

OUR COURSES PARTNERS

Registered with the UK Register of Learning Providers (UKRLP)
UKPRN: 10063816

Artboard-1-1

© Visio Learning.

Select your currency
USD United States (US) dollar