
Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.
Non-Linear: Random Order
Course overview
In today’s cyber world, it is important for engineers to understand and appreciate computer/information security as it has become an essential aspect of our daily life.
Course description
This course provides students with concepts of computer security,Threats & Prevention Methods, Data Security Consideration, Frameworks & Cybersecurity Technology, Cybersecurity Attacks -Types of Cyber Attackers, Policies & Standards Learning Outcomes Upon the completion of this course, students should be able to understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
1.1 Introduction & History
1.2 The Evolution of Cybersecurity
1.3 Importance of Cyber Security
1.4 Scope of Cyber Security
Introduction - Assessment
5 Questions
Cyber Security Introduction
Duration:
2.1 Cyber Security vs Information Security
2.2 Overview of Information Security
2.3 Similarities Between Cyber Security and Information Security
Cyber Security vs Information Security - Assessment
5 Questions
Ref Cyber Security vs Information security
Duration:
3.1 Relationship Between Threats and Prevention Methods
3.2 Types of Threats
3.3 Types of Prevention Methods
3.4 Implementing Prevention Methods
Threats And Prevention Methods - Assessment
5 Questions
Cyber Security Threats and Prevention
Duration:
4.1 Framework & Technology
4.2 Types of Cybersecurity Frameworks
4.3 Types of Cybersecurity Technologies
4.4 Implementing Frameworks and Technologies
Frameworks - Assessment
5 Questions
Cyber security Frameworks
Duration:
5.1 Security Technologies
5.2 Firewalls
5.3 Intrusion Detection Systems (IDS)
5.4 Antivirus Software
5.5 Encryption
Security Technologies - Assessment
5 Questions
Firewalls and Intrusion Detection
Duration:
6.1 Types of Cyber Attacks and Its Preventive Measures
6.2 Cyber Attacks Protection
6.3 Consequences of a Cyber Attack
6.4 The Laws and Regulations That Govern Cyber Security
6.5 Think Like A Hacker
Cyber security - Attacks - Assessment
5 Questions
Cyber Security Attackes
Duration:
7.1 Policies
7.2 Importance of Having a Cyber Security Policy
7.3 Responsibilities of Employees & Management
Cybersecurity Policies - Assessment
5 Questions
Ref: Cybersecurity Policies
Duration:
8.1 Security Standards
8.2 Careers in Cyber Security and Types of Cyber Security Jobs
8.3 Skills Required for Cyber Security Jobs
8.4 How to Get a Job in Cyber Security
Cyber Security Standards - Assessment
5 Questions
Ref: Privacy regulation in Europe
Duration:
Final Assessment
20 Questions
The certificate issued for the Course will have
Only the e-certificate will be made available. No Hard copies. The certificates issued by uLektz Academy . can be e-verifiable at www.ulektzskills.com/verify.
50 hours Learning Content
100% online Courses
English Language
Certifications