Need Assistance? 01384 442752 (UK)

CYBER SECURITY VIT103

Duration (approx) 100 hours
Qualification Statement of Attainment

In today’s world, computers and smart devices are at the centre of almost everything. They track our information, record places we go, and store payment data. This means it is more important than ever for each of us to understand privacy threats, cyber security concerns, and defences against potential attackers.

Courses can be started anytime from anywhere in the world!

towergatelogo.jpg PROFESSIONAL LIABILITY INSURANCE FOR ACS GRADUATES
Towergate Insurance welcomes Professional Liability insurance applications from ACS graduates across all disciplines. Click here for more details.
 

It's easy to enrol...

1
Select a payment plan:  

2
Select a learning method  

3

In today’s world, computers and smart devices are at the centre of almost everything. They track our information, record places we go, and store payment data. This means it is more important than ever for each of us to understand privacy threats, cyber security concerns, and defences against potential attackers.


Course Outline

There are 11 lessons in this course:

  1. Introduction to Cyber Security and cyber attacks/defences
  2. Vulnerability Assessment
  3. Securing the facilities and networks
  4. Securing your online digital footprint
  5. Internet Security and Digital Certificates
  6. Wireless Network Vulnerabilities, Attacks and Security
  7. Firewalls, IDS and IPS
  8. Cryptography
  9. Access Control and Authentication
  10. Cyber attack Disaster Recovery strategies
  11. Ongoing Security Management

Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.

Course Aims

  • Define cyber security.
  • Explain the goals and importance of cyber security.
  • Understand important terminology relating to cyber security and list some attacks and defence mechanisms.
  • Explain how to perform a vulnerability assessment.
  • Understand the tools and techniques available.
  • Compare and contrast vulnerability scanning and penetration testing.
  • Explain how to secure physical data storage, data centre security, data warehouse and networks.
  • Understand the effects of leaving a wide online digital footprint.
  • Understand the options available for users to manage their online digital footprint.
  • Understand what a firewall, an Intrusion Detection System (IDS), and an Intrusion Prevention System (IPS) represent in the world of cyber security.
  • Explain the importance and functions of firewalls, IDS and IPS systems, and the benefits and protection they offer in protecting computers as well as computer networks.
  • Understand the concept of cryptography and the importance of encrypting and decrypting data.
  • Explain components of cryptographic protocols and common standards used in encryption and decryption.
  • Understand the importance of digital signatures and digital certificates in securing web traffic.
  • List the various types of wireless data communications networks and understand types of vulnerabilities and attacks against each of them.
  • Explain wireless network security standards available to protect wireless networks.
  • Define Access Control and become familiar with its terminology.
  • Understand the importance of implementing access control models.
  • Define authentication and understand the importance of creating and securing strong passwords and implementing double-factor or multi-factor authentication.
  • Explain how to recover from a cyber-attack and best procedures for setting up redundancy and quick recovery methods prior and after attack has occurred and minimizing impacts to systems and networks involved.

Duration:  100 hours of self paced study

 

WHY STUDY CYBER SECURITY?

Learn to Minimse Risk in Your Own Work Environment

Lay a Foundation to build Your Skills So You Can Help Others

Cyber security is something that needs to be treated as important by both personal users as well as business who collect and store information. Computer security is a lot like house or car security, there is so much that we can do to protect it, but there is always someone who will come up with ways of breaching that security. It is like a game of cat and mouse, whereas ways of securing data are implemented to stop people gaining access to data and systems, there are people who find ways of getting around these protections to gain access.

There are many different types of threats to cyber security and throughout this course you will explore many different measures that can be taken to reduce risks associated with these various problems.

Some types of attack are obvious, and some are unseen until it is too late to do anything about it, some may never be seen. There are basically two ways that attacks can occur, passive and active.

Passive Attacks

In a passive attack, there is usually a program that does the work of scanning systems for vulnerabilities, information and flaws in systems in order to gathering ways in which the system can possible be breached. They will scan for known vulnerabilities in systems that may not have been secured correctly, they may not do anything with this information or they may use it to implement a more specific active attack. Passive attacks to systems are what accounts for most of the attacks that happen.

Active Attacks

In an active attack, there is a more specific target and a more specific goal for the attack, which means these can pose a greater threat to the intended target. These attacks often have the goal of changing the system in some way, gathering specific data, gaining full access to systems or retrieving information on those systems. This can be very dangerous to the intended target because when an unintended third party has this level of control or access to a system they can do many things that can be destructive to the owner of the system.
A brute force attack is a common active attack that will attempt to gain access to a system by cracking the password used to legitimately enter a system. This type of attack can be easy or hard, depending on the strength of the password, the power of the system making the attack and the ability of the attacker, usually this is performed with software, a dictionary attack can also be used which is faster and uses a list of known words to try and guess the password. It can vary on the time it takes them to be cracked depending on a number of factors and complexity of the password used.

 

 

Meet some of our academics

Dr. Sherif SakrResearch Scientist and University Lecturer in Computer Science and Engineering. Sherif has a PhD in Computer Science, MSc, BSc.
Josiane JoubranCSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP, MCSE.