• LOGIN
  • No products in the cart.

Cyber Security is yet another “Teacher’s Choice” course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Cyber Security and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills.

Consisting of several modules, the course teaches you everything you need to succeed in this profession.

The course can be studied part-time. You can become accredited within 6 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website.

Why Choose Teachers Training

Some of our website features are:

Entry Requirements

No formal entry requirements. You need to have:

Certification

CPD Certification from The Teachers Training

After you have successfully completed your assignment, you will be qualified to apply for a CPD Certification from The Teachers Training. The PDF certificate can be downloaded instantly right after you have completed your course.

  • PDF certificate is completely FREE
  • Hard copy certificates are also available, and you can get one for only £8.99

The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs.

Course Curriculum

FUNDAMENTALS OF NETWORKING
Network Topologies 00:06:00
History and Applications of Computer Networking 00:06:00
Protocols and Standards 00:04:00
Introduction to OSI Model 00:04:00
Layers of OSI Model 00:07:00
Introduction to TCP/IP Model 00:10:00
OSI Model vs TCP/IP Model 00:04:00
Addressing in Computer Networks 00:09:00
IP Address- IPv4 and IPv6 00:07:00
Classes of IP Address 00:10:00
PRACTICAL : HOW TO FIND OUT YOUR PC’s IP ADDRESS 00:03:00
PRACTICAL : HOW TO FIND OUT YOUR PC’S MAC ADDRESS 00:05:00
The Internet Protocol (IP) 00:07:00
Address Resolution Protocol (ARP) 00:09:00
Dynamic Host Configuration Protocol (DHCP) 00:08:00
Internet Control Message Protocol (ICMP) 00:06:00
RIP and OSPF Protocols 00:06:00
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT 00:03:00
What are Sockets? 00:05:00
File Transfer Protocol (FTP) 00:03:00
Hypertext Transfer Protocol (HTTP) 00:04:00
Domain Name System (DNS) 00:03:00
GETTING STARTED WITH CYBER SECURITY
Definition of Computer Security 00:03:00
Interesting Facts about Cyber Security 00:05:00
History of Cyber Security 00:07:00
Scope and Career Insights in Cyber Security 00:08:00
LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY
Introduction 00:01:00
Types of Computer Security 00:03:00
Key Terms in Cyber Security 00:07:00
The Elements of Information Security 00:06:00
Types of Attacks 00:10:00
Roles in Cyber Security : Part 1 00:08:00
Roles in Cyber Security : Part 2 00:06:00
DIVING DEEP INTO CYBER SECURITY
Security Architect’s View of Security 00:08:00
What is Vulnerability Assessment? 00:05:00
4 Phases of Vulnerability Assessment 00:09:00
Introduction to Cryptography 00:06:00
Symmetric Encryption 00:03:00
Asymmetric Encryption 00:04:00
Hashing 00:07:00
Security Organizations 00:05:00
Critical Thinking in Cyber Security 00:04:00
The Five Critical Thinking Skills 00:06:00
PRACTICAL : USING NSLOOKUP TOOL 00:03:00
TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES
Different types of Actors in Cyber Security 00:10:00
Types of Cyber Attacks 00:04:00
Hacking Organizations around the Globe 00:05:00
Security Services and Mechanisms 00:03:00
Introduction to Threats 00:03:00
What is a Malware? 00:07:00
Types of Trojans 00:06:00
Types of Virus 00:07:00
Have you ever heard about a Ransomware? 00:09:00
The Cyber Kill Chain 00:09:00
Introduction to Social Engineering 00:05:00
Types of Social Engineering 00:07:00
KEY SECURITY CONCEPTS
Confidentiality – The Most Important Element of Security 00:04:00
Introduction to Incident Response Team 00:05:00
Phases of Incident Response 00:05:00
Laws in Cyber Security 00:05:00
What are Audits in Cyber Security 00:04:00
Internal Audit vs External Audit 00:04:00
The NIST Framework 00:03:00
The COBIT Framework 00:04:00
FIREWALLS AND ANTIVIRUS
Intrusion Detection System 00:05:00
Introduction to Firewalls 00:05:00
What is DMZ? 00:04:00
Different types of Firewalls 00:09:00
Review

COURSE REVIEWS

Course Reviews

4.9

4.9
12 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

COPYRIGHT TEACHERS TRAINING