Cyber Security Officer Training - Complete Video Course

Location
Online
Dates
Can be taken anytime
Course Type
Professional Training Course
Accreditation
Yes (Details)
Language
English
Price
$350 $136 only

Course Overview

The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity.

The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company.

Who should take this course

Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Accreditation

CPD

Course content

COURSE CURRICULUM Ethical Hacking

  • Overview
  • Reconnaissance
  • Protocols
  • Windows Hacking
  • Attacking Web Technologies
  • Pen Testing Wireless Networks

Professional Hacking

  • Security Fundamentals
  • Access Controls
  • Protocols
  • Cryptography
  • Why Vulnerability Assessments?
  • Vulnerability Tools of the Trade
  • Output Analysis and Reports
  • Reconnaisance, Enumeration and Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks
  • Malware
  • Buffer Overflows
  • Password Cracking

Penetration Testing I

  • Packet Capturing
  • Layer 2 Attacks
  • Layer 3 Attacks on Cisco Based Infrastructures
  • Pivoting and Relays
  • IPv6 Attacks
  • VPN Attacks
  • Defeating SSL
  • IDS/IPS Evasion

Penetration Testing II

  • Logistics of Pen Testing
  • Linux Fundamentals
  • Information Gathering
  • Detecting Live Systems
  • Enumeration
  • Vulnerability Assessments
  • Malware Goes Undercover
  • Windows Hacking
  • Hacking UNIX/Linux
  • Advanced Exploitation Techniques
  • Pen Testing Wireless Networks
  • Networks, Sniffing and IDS
  • Injecting the Database
  • Attacking Web Technologies
  • Project Documentation

Web Application Security

  • Web Application Security
  • Secure SDLC
  • OWASP TOP 10
  • Risk Management
  • Threat Modeling
  • Authentication and Authorization Attacks
  • Session Management
  • Security Architecture
  • Input Validation and Data Sanitization
  • AJAX Security
  • Insecurity Code Discovery and Mitigation
  • Application Mapping
  • Cryptography
  • Testing Methodologies

Security Leadership

  • Security Management
  • Risk Management
  • Encryption
  • Information Security - Access Control Concepts
  • Incident Handling and Evidence
  • Operations Security
  • Knowing Network Security

Security Sentinel

  • Basic Security
  • User Awareness
  • Implementing Countermeasures
  • Certified Security Sentinel
  • Using the Internet at Work
  • Accessing the Company's Network Through Your Assigned Computer
  • Accessing the Corporate Network Remotely
  • Social Engineering
  • Understanding and Manipulating our Target
  • Researching Our Target

Vulnerability Assessment

  • Why Vulnerability Assessment
  • Vulnerability Types
  • Assessing the Network
  • Assessing Web Servers & Applications
  • Assessing Remote & VPN Services
  • Vulnerability Assessment Tools of the Trade
  • Output Analysis

Assessment & Certification:

To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee.

  • Hardcopy Certificate by post - GBP19
  • Soft copy PDF via email - GBP10

About Course Provider

We are a company who is best known for offering awarding body accredited online courses that are available for anyone who wishes to acquire a certification and take their professional life to the next level.

As an online learning site, we are aware of the fact that there are a lot of people out there who considers themselves to be a curious learner but the courses that they are interested in are not available in the area. So, we have decided to give them a chance to learn in a convenient way – in their own convenient place and time.

Frequently asked questions

{{ item.question }}