Call us: +44 (0)1227 789 649 - Monday to Friday 9am to 5pm

Cyber Security

Cyber Security 100 Hours Certificate Course

Course Code:
Study From:
Tutor Support:
Unlimited Access

Enrolling Made Simple

From £325

Contact us!

Learn About Cyber Security

Cyber Security Online Course

Learn about cyber security, the different potential threats to be aware of, plus the available mechanisms you can use to protect your digital privacy.

Every day now it seems, we hear of cyber attacks on banks, businesses and people, with some cyber threats being more sophisticated than others. Gain the skills to take the steps possible to help prevent yourself and your loved ones being victims of cyber criminals, with this level 4 rated certificate course.

Defend your business against cyber crime, or enhance your professional development with a solid understanding of cyber security, to offer something that little bit more to an employer. Remember, not all companies are big enough to employ professionals, so anyone with skills in helping to prevent cyber attacks should be very warmly welcomed.

Just look at the learning goals, lesson structure and practical set tasks you will undertake below, and you will see that this is no ordinary cyber security course. As with all ADL distance learning programmes, it has been developed by experts in the field, with real life application very much in mind.

Read More

Course Information

Other Categories


Lesson Structure: Cyber Security VIT103

There are 11 Lessons:

1  Introduction to Cyber Security and Cyber Attacks/Defenses

  • The Importance of Cyber Security
  • Threats to cyber security
  • Common types of attacks
  • A Layered Approach to Defense Mechanisms
  • Data Centre Network
  • Physical Security
  • Software and Operating System Security
  • Network Security

2  Vulnerability Assessment

  • Introduction
  • Assessing Vulnerabilities
  • Security Posture
  • Performing a Vulnerability Assessment
  • Identifying Assets and classifying them
  • Threats and Risk Assessment
  • Baseline Reporting
  • Penetration Testing
  • Techniques
  • Penetration Testing vs Vulnerability Assessment

3  Securing Facilities and Networks

  • Securing a Data Centre
  • Securing the Network
  • Hardware – modem/router Level
  • Software PC and Device level

4  Securing Your Online Digital Footprint

  • Introduction
  • What are Digital Footprints?
  • Social Media
  • Web browsing history and online shopping
  • Devices used
  • The importance of managing a digital footprint
  • Protecting the user’s reputation
  • Deciding where and how personal information is shared
  • Preserving freedoms
  • Preventing financial losses
  • How to manage a digital footprint
  • Understand the privacy risks of online identities
  • Developing better online habits
  • Investigate default settings for online tools and services
  • Using privacy-enhancing tools

5  Internet Security and Digital Certificates

  • Introduction
  • Digital Certificates
  • Digital Signatures
  • DRM (Digital Rights Management) and IRM (Information Rights Management
  • Generating a Digital Certificate
  • Exchanging a Digital Certificate
  • Verifying a Digital Certificate
  • Web browsing
  • Security Issues
  • Secure Web Browsing using https

6  Wireless Network Vulnerabilities, Attacks and Security

  • Introduction
  • Types of Wireless Dara Networks
  • NFC and Bluetooth Networks Attacks
  • WLAN (Wireless LAN) attacks
  • Introduction to network “blurred edges”
  • Wireless data replay attacks
  • Wireless DOS (Denial Of Service) attacks
  • Rogue Access Point
  • Attacks on Home WLANs – War Driving and War Chalking
  • Wireless security vulnerability and solutions
  • IEEE Wireless Security Vulnerabilities

7  Firewalls, IDS, and IPS

  • Introduction
  • Types of Firewall Protection
  • Packet Filtering Firewall
  • Application/Proxy Firewall
  • Hybrid Firewall
  • Firewall Limitations
  • Formats of Firewalls
  • UTM appliance
  • Intrusion Detection Systems
  • Network Intrusion Detection Systems (NIDS)
  • Host-Based Intrusion Detection Systems (HIDS)
  • Intrusion Prevention Systems
  • Common Detection Methodologies: Anomaly Based IDPS, Signature-Based IDPS

8  Cryptography

  • Introduction
  • What is Cryptography? Definition, Terminology and Characteristics
  • Common cipher attacks
  • Ciphertext Only Attacks (COA)
  • Known Plaintext Attack (KPA)
  • Dictionary Attack
  • Brute Force Attack (BFA)
  • Power Analysis Attack
  • Fault Analysis Attack
  • Cryptographic Algorithms
  • Symmetric Encryption
  • Asymmetric Encryption

9  Access Control and Authentication

  • Introduction
  • What is Access Control?
  • Definition and Terminology
  • Access Control Models
  • Implementing Access Control
  • Group Policies
  • ACL (Access Control Lists)
  • DACL (Discretionary Access Control List)
  • SACL (System Access Control List)
  • What is Authenticication and Authorisation?
  • Securing and protecting passwords
  • Multi-Factor Authentication

10 Cyber-Attack Disaster Recovery Strategies

  • Introduction
  • Cyber Attack Recovery Planning and Preparation
  • Backup procedures
  • Monitoring and logging of events
  • Containment of attack
  • Assessing Damage/Loss Caused
  • Recovery procedures
  • Authorities and Tracking Down Attackers
  • Data and Security Policies

11  Ongoing Security Management

  • Introduction
  • Managing Security Events
  • Centralized vs Distributed data collection
  • Being Organised
  • Understanding the Workplace
  • Networking
  • Attitude
  • Products and Services
  • The Law
Scroll to Top


To speak to one of our course advisors, please enter your name and phone number below and click the "Please Call Me" button. We will call you back as soon as possible!

By submitting this form, I provide my consent to ADL to contact me via email or telephone, regarding the course I selected. All information provided is protected in conformity with our Privacy Policy.


required fields are marked with *

By submitting this form, I provide my consent to ADL to contact me via email or telephone, regarding the course I selected. All information provided is protected in conformity with our Privacy Policy.