• LOGIN
  • No products in the cart.

Security controls can protect your essential information, physical property, computer network and other valuable assets. You must join [course_title] to learn more about security controls.

By joining this course, you will learn to identify authorised and unauthorised devices and software. You will learn how to control and monitor an account. Apart from that, you will gain knowledge of data recovery system and application software security. This course will teach you about analysing audit logs as well.

So what are you thinking now? Be a member of this incredible [course_title] and expand your skills and knowledge.

Course Highlights

  • Internationally recognised accredited certification on successful completion
  • Free accredited e-certificate
  • Study at your own pace, anytime and anywhere
  • Access to all courses with a monthly membership plan of £29
  • High quality video and text course materials
  • Efficient exam system, assessment and instant results
  • Improve your chance of gaining professional skills and better earning potential
  • Eligibility for NUS Extra card which gives you a discount from thousands of retailers

Requirements

There is no experience or previous qualifications required for enrolment on this course. It is available to all students of all academic backgrounds.

Assessment and Certification

You can test your learning as you progress through the course by undertaking mock tests. On completion of the course, there will be an assessment consisting of multiple choice questions for which the pass mark is 60%. On passing, you will gain instant access to your e-certificate.  PDF and hard copy certificates can be ordered for an additional fee.

  • PDF Certificate – £9
  • Hardcopy by Post- £19
  • Both PDF and Hardcopy – £24

Tutor Support

With all our courses, you will receive access to dedicated tutors and technical support. You will also be provided with unlimited email, phone and live chat support to help answer any questions you might have whilst studying the course.

Course Compatibility

All our courses are fully compatible with PC’s, Mac’s, tablets and smartphones.

Career Path

Completing this course will help you to increase your knowledge and improve your skills and instil in you the confidence to progress. You will also be able to add your qualification to your CV, enhance your career and become more competitive within your chosen industry.

Course Curriculum

Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Devices 00:06:00
Inventory of Authorized and Unauthorized Software
Inventory of Authorized and Unauthorized Software 00:06:00
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Secure Configurations for Hardware and Software on Laptops, Workstations and Servers 00:11:00
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches 00:13:00
Boundary Defense
Boundary Defense 00:09:00
Maintenance, Monitoring, and Analysis of Audit Logs
Maintenance, Monitoring, and Analysis of Audit Logs 00:09:00
Application Software Security
Application Software Security 00:14:00
Controlled Use of Administrative Privileges
Controlled Use of Administrative Privileges 00:09:00
Controlled Access Based on Need to Know
Controlled Access Based on Need to Know 00:06:00
Continuous Vulnerability Assessment and Remediation
Continuous Vulnerability Assessment and Remediation 00:10:00
Account Monitoring and Control
Account Monitoring and Control 00:10:00
Malware Defenses
Malware Defenses 00:10:00
Limitation and Control of Network Ports, Protocols and Services
Limitation and Control of Network Ports, Protocols and Services 00:07:00
Wireless Device Control
Wireless Device Control 00:14:00
Data Loss Prevention
Data Loss Prevention 00:09:00
Secure Network Engineering
Secure Network Engineering 00:06:00
Penetration Tests and Red Team Exercises
Penetration Tests and Red Team Exercises 00:11:00
Incident Response Capability
Incident Response Capability 00:07:00
Data Recovery Capability
Data Recovery Capability 00:06:00
Security Skills Assessment and Appropriate Training to Fill Gaps
Security Skills Assessment and Appropriate Training to Fill Gaps 00:08:00
Mock Exam
Final Exam

Course Reviews

4.9

4.9
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE

....

Instructors

477 STUDENTS ENROLLED

    APPROVED COURSE CENTRE

     

    Approved Course Centre CPDQS

    Alpha-Academy-Certificate-Mockup13

    Our Students Say..

    OUR COURSES PARTNERS

    Registered with the UK Register of Learning Providers (UKRLP)
    UKPRN: 10063816

    Artboard-1-1

    © Visio Learning.

    Select your currency
    USD United States (US) dollar