Ask a question
Cyber Security 100 Hours Certificate Course
Cyber Security Online Course: Learn about cyber security, the different potential threats to be aware of, plus the available mechanisms you can use to protect your digital privacy.
Every day now it seems, we hear of cyber attacks on banks, businesses and people, with some cyber threats being more sophisticated than others. Gain the skills to take the steps possible to help prevent yourself and your loved ones being victims of cyber criminals, with this level 4 rated certificate course.
Defend your business against cyber crime, or enhance your professional development with a solid understanding of cyber security, to offer something that little bit more to an employer. Remember, not all companies are big enough to employ professionals, so anyone with skills in helping to prevent cyber attacks should be very warmly welcomed.
Just look at the learning goals, lesson structure and practical set tasks you will undertake below, and you will see that this is no ordinary cyber security course. As with all ADL distance learning programmes, it has been developed by experts in the field, with real life application very much in mind.
Learning Goals: Cyber Security VIT103
- Define cyber security.
- Explain the goals and importance of cyber security.
- Understand important terminology relating to cyber security and list some attacks and defence mechanisms.
- Explain how to perform a vulnerability assessment.
- Understand the tools and techniques available.
- Compare and contrast vulnerability scanning and penetration testing.
- Explain how to secure physical data storage, data centre security, data warehouse and networks.
- Discuss implementation of key methods.
- Understand the effects of leaving a wide online digital footprint.
- Understand the options available for users to manage their online digital footprint.
- Explain how digital signatures are used, and how to generate, exchange and verify Digital Certificates.
- Understand web browsing security issues using the http protocol, and how to use certificates to secure web browsing using the https protocol.
- List the various types of wireless data communications networks and understand types of vulnerabilities and attacks against each of them.
- Explain wireless network security standards available to protect wireless networks.
- Understand what a firewall, an Intrusion Detection System (IDS), and an Intrusion Prevention System (IPS) represent in the world of cyber security.
- Explain the importance and functions of firewalls, IDS and IPS systems, and the benefits and protection they offer in protecting computers as well as computer networks.
- Understand the concept of cryptography and the importance of encrypting and decrypting data.
- Explain components of cryptographic protocols and common standards used in encryption and decryption.
- Define Access Control and become familiar with its terminology.
- Understand the importance of implementing access control models.
- Define authentication and understand the importance of creating and securing strong passwords and implementing double-factor or multi-factor authentication using the various means of authentication presented in this lesson.
- Explain how to recover from a cyber-attack.
- Discuss best procedures for setting up redundancy and quick recovery methods prior to an attack.
- Discuss best practices after an attack has occurred and minimizing impacts to systems and networks involved.
- Understand how to better manage the network in order to strengthen network control, through managing security events, implementing better network auditing strategies, and managing an intrusion detection and prevention system.
Lesson Structure: Cyber Security VIT103
There are 11 Lessons:
1 Introduction to Cyber Security and Cyber Attacks/Defenses
- The Importance of Cyber Security
- Threats to cyber security
- Common types of attacks
- A Layered Approach to Defense Mechanisms
- Data Centre Network
- Physical Security
- Software and Operating System Security
- Network Security
2 Vulnerability Assessment
- Assessing Vulnerabilities
- Security Posture
- Performing a Vulnerability Assessment
- Identifying Assets and classifying them
- Threats and Risk Assessment
- Baseline Reporting
- Penetration Testing
- Penetration Testing vs Vulnerability Assessment
3 Securing Facilities and Networks
- Securing a Data Centre
- Securing the Network
- Hardware – modem/router Level
- Software PC and Device level
4 Securing Your Online Digital Footprint
- What are Digital Footprints?
- Social Media
- Web browsing history and online shopping
- Devices used
- The importance of managing a digital footprint
- Protecting the user’s reputation
- Deciding where and how personal information is shared
- Preserving freedoms
- Preventing financial losses
- How to manage a digital footprint
- Understand the privacy risks of online identities
- Developing better online habits
- Investigate default settings for online tools and services
- Using privacy-enhancing tools
5 Internet Security and Digital Certificates
- Digital Certificates
- Digital Signatures
- DRM (Digital Rights Management) and IRM (Information Rights Management
- Generating a Digital Certificate
- Exchanging a Digital Certificate
- Verifying a Digital Certificate
- Web browsing
- Security Issues
- Secure Web Browsing using https
6 Wireless Network Vulnerabilities, Attacks and Security
- Types of Wireless Dara Networks
- NFC and Bluetooth Networks Attacks
- WLAN (Wireless LAN) attacks
- Introduction to network “blurred edges”
- Wireless data replay attacks
- Wireless DOS (Denial Of Service) attacks
- Rogue Access Point
- Attacks on Home WLANs – War Driving and War Chalking
- Wireless security vulnerability and solutions
- IEEE Wireless Security Vulnerabilities
7 Firewalls, IDS, and IPS
- Types of Firewall Protection
- Packet Filtering Firewall
- Application/Proxy Firewall
- Hybrid Firewall
- Firewall Limitations
- Formats of Firewalls
- UTM appliance
- Intrusion Detection Systems
- Network Intrusion Detection Systems (NIDS)
- Host-Based Intrusion Detection Systems (HIDS)
- Intrusion Prevention Systems
- Common Detection Methodologies: Anomaly Based IDPS, Signature-Based IDPS
- What is Cryptography? Definition, Terminology and Characteristics
- Common cipher attacks
- Ciphertext Only Attacks (COA)
- Known Plaintext Attack (KPA)
- Dictionary Attack
- Brute Force Attack (BFA)
- Power Analysis Attack
- Fault Analysis Attack
- Cryptographic Algorithms
- Symmetric Encryption
- Asymmetric Encryption
9 Access Control and Authentication
- What is Access Control?
- Definition and Terminology
- Access Control Models
- Implementing Access Control
- Group Policies
- ACL (Access Control Lists)
- DACL (Discretionary Access Control List)
- SACL (System Access Control List)
- What is Authenticication and Authorisation?
- Securing and protecting passwords
- Multi-Factor Authentication
10 Cyber-Attack Disaster Recovery Strategies
- Cyber Attack Recovery Planning and Preparation
- Backup procedures
- Monitoring and logging of events
- Containment of attack
- Assessing Damage/Loss Caused
- Recovery procedures
- Authorities and Tracking Down Attackers
- Data and Security Policies
11 Ongoing Security Management
- Managing Security Events
- Centralized vs Distributed data collection
- Being Organised
- Understanding the Workplace
- Products and Services
- The Law
Set Practical Tasks: Cyber Security VIT103
- Research layered defence concepts and in particular the idea of defence in depth.
- Research and explain a type of cyber-attack that is not listed in this lesson. Spend no more than 1 hour on this
- Undertake research online and report on good vulnerability scanners currently available in the market. Compare and contrast them. Spend no more than 1 hour on this task.
- Undertake research online and report on good penetration testing tools currently available in the market. Compare and contrast them. Spend no more than 1 hour on this task.
- Research a recent cyber attack. Spend no more than 1 hour on this task.
- Research a method of Network security that is not listed in the lesson.
- Research a method of Data centre security that is not listed in the lesson.
- Research 4 privacy enhancing tools online, such as VPNs, password managers, and other encryption software. Take notes; you may wish to create a table to contrast options. Spend no more than 1 hours on this task.
- Research digital certificates and digital certificate issuers online. Compare different types of certificates and issuers. You may wish to use a table for this. Spend no more than 1 hour on this task.
- Research hash values and hash functions. Clearly define the difference between the two, and think when they're required, why, and how they work. Spend no more than 1 hour on this task.
- Undertake research into the IEEE WLAN standards and summarize your findings into a table showing the standards name, the year it was introduced, frequency, maximum data rates, as well as indoor and outdoor range. Briefly explain the differences. Spend no more than 1 hour on this task.
- Research the latest firewall solutions in the market. Read about their features, advantages, disadvantages and their application in the world of cyber security. Spend no more than 1 hour on this task.
- Research the latest NIDS and HIDS solutions in the market. Pick the 2 most used/popular solutions for NIDS and the 2 most used/popular solutions for HIDS and read about how they work, their advantages, any licensing costs involved, and more. Spend no more than 2 hours on this task.
- Undertake research into the various encryption algorithms, the size of the keys being used, and how long it would take to crack them using a brute force attack using today’s computer powers.
- Research other types of Access control models that are available. Spend no more than 1 hour on this task.
- Research different types of access control devices. Spend no more than 1 hour on this task.
- Research other forms of multi factor authentication and devices that are used. Specifically, research 2FA: what it is and how it is used.
- Undertake research into the current uses of the AES encryption algorithm (think about mobile data encryption, WIFI data transmissions, etc.)
- Research SOE and image third-party software online. Take notes on the potential positives and negatives of using third-party software for this. Spend no more than 1 hour on this task.
- Think about companies with a high potential of loss due to cyberattack. Create an at-risk profile, an at moderate risk profile, and a low-risk profile for such firms. Include the type of potential costs incurred with each, along with a plan to make the at-risk and at moderate risk firms less vulnerable. Research as necessary. Spend no more than 2 hours on this task.
- Research what a security policy is and how they are written within a business to help ensure that employees and customers are aware at all times of what constitutes acceptable behaviour.
- Research and report 1 page on two different types of software that is used to manage or automate tasks on computers.
- From set task 1 investigate 5 alternative software applications that do the same as you found and compare their differences and how they operate.
- Research 5 different methods or tools (software or hardware) that can be used in recovery or defence of a cyber-attack.
Each lesson is completed with a written assignment, based on the reading and set tasks. Assignments are marked and graded by personally assigned tutors, and returned with helpful comments and suggestions.
|How Do Our Tuition Fees Compare?|
|Course Start||Begin your learning at any time.|
|Course Prerequisite||None - Our course levels are an indication of the depth of learning you should receive. They do not describe the level of difficulty.|
|Course Qualification (Study Option A)||Endorsed Qualification from TQUK - Training Qualifications UK, an Ofqual Approved Awarding Organisation - Completed written assignments and final evaluation per course/module to be taken.|
|Course Qualification (Study Option B)||Certificate of Attainment from ADL - Completed written assignments only - no final evaluation.|
|Comparative Credits Information||UK Course Credits: 10 - U.S. Credit Hours: 3 - when compared to regulated courses.|
|Course Duration and Deadlines||Course hours given are a guide only. You will be encouraged to work at your own pace to learn as much as you can, with no assignment deadlines or end date by which you must complete your course by. You are in control!|
|Study Support||Personal tutor/mentor support from industry relevant professionals throughout your whole course. Mentors are contactable by e-mail, telephone and through the Moodle online classroom. They provide assistance with your course material, plus discuss, explain and give advice when needed. They will also mark and grade your assignments, plus provide constructive and helpful feedback vital to your success.|
|Suitability for Self Employment and Small Businesses||Our courses are ideal for sole traders and small business owners and their staff. Customer confidence in what you can do will determine how successful you are in getting clients. Doing the job right using the correct knowledge and skills, leads to repeat business and referrals to friends, family and work colleagues. Completing one or more of our courses for the service you have to offer, will give you the tools to achieve this and grow your business.|
|Recognition of Your Course By Employers||We aim to achieve the correct balance between your qualification being recognised and providing you with the in-depth learning, to empower you to succeed. If you can demonstrate that you have the level of knowledge and transferable skills necessary to an employer, you should stand out from someone who has only received a superficial understanding of what's required - Select study option A when enrolling, so an employer can check the status of the awarding organisation for your qualification on the Ofqual Register.|
|Recognition of Your Course By Universities||As you will see on our Testimonials page, previous students have used their qualification from us to get into university. However each one will have its own entrance criteria and acceptance may also depend on your other qualifications and experience. We can approach up to three universities on your behalf with details of our course before you enrol, so you will know whether it will be accepted as part of their application process. Please complete our contact form and we will begin the process.|
|Designing Your Own Qualification||Bundle up your choice of related courses to form your own qualification. Our Advanced Certificates (4 courses), Diplomas (6 courses), Advanced Diplomas (8 courses) and Higher Advanced Diplomas (12 courses), are used to differentiate between the in-depth knowledge and skills you will acquire in your chosen area of study. e.g. Advanced Certificate in Turf Care Management, which includes individual courses: Turf Care, Sports Turf Care, Turf Repair and Renovation and Turf Grasses.|
|How Can I Enrol?||Online by selecting your study option, learning materials, plus payment option and then clicking the Enrol Now button - By contacting us for an application form - By telephoning us on 01227 789 649 (International: 0044 1227 789 649). Lines open 9am till 5pm Monday to Friday, excluding Bank Holidays and between Christmas and New Year.|
|How Can I Get a Pro-forma Invoice for my Employer?|
Cyber Security 100 Hours Certificate Course
"Fantastic Teacher. Well organised modules. Assignments force me to learn and research more so I can prepare well for exams. I really enjoyed studying via ADL. I can now continue study at Ulster University which accept my certificate from ADL". Level 4, Advanced Certificate in Applied Science, VSC001, Stanislawa, Poland.
Its with great pleasure I am announcing you my new job as 'Park Manager' for a 5 star hotel in Reunion Island. Its definitely my courses with ADL (Botany, Agronomy and Trees for Rehabilitation) which were decisive for my nomination. Accordingly, my sincere thanks goes to all the ADL team.
"The course was a valuable learning experience as it provided me with the knowledge and understanding for me as a Careers Advisor. The feedback was very good from my tutor, and allowed me to build upon my assignments that were marked. The comments were very informative and very useful. Well written course material." Andrew W, Careers Counselling, UKMore Reviews....