Booking options
£22
£22
On-Demand course
46 hours
All levels
The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity.
The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company.
At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Our Cyber Security Officer Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
Ethical Hacking | |||
Overview | FREE | 00:35:00 | |
Reconnaissance | 00:25:00 | ||
Protocols | 01:25:00 | ||
Windows Hacking | 01:19:00 | ||
Attacking Web Technologies | 00:56:00 | ||
Pen Testing Wireless Networks | 01:34:00 | ||
Professional Hacking | |||
Security Fundamentals | FREE | 00:51:00 | |
Access Controls | 00:33:00 | ||
Protocols | 00:36:00 | ||
Cryptography | 00:52:00 | ||
Why Vulnerability Assessments? | 00:36:00 | ||
Vulnerability Tools of the Trade | 00:10:00 | ||
Output Analysis and Reports | 00:13:00 | ||
Reconnaisance, Enumeration and Scanning | 00:51:00 | ||
Gaining Access | 00:31:00 | ||
Maintaining Access | 00:17:00 | ||
Covering Tracks | 00:18:00 | ||
Malware | 00:09:00 | ||
Buffer Overflows | 00:22:00 | ||
Password Cracking | 00:33:00 | ||
Penetration Testing I | |||
Packet Capturing | 00:38:00 | ||
Layer 2 Attacks | 00:59:00 | ||
Layer 3 Attacks on Cisco Based Infrastructures | 01:09:00 | ||
Pivoting and Relays | 00:20:00 | ||
IPv6 Attacks | 00:49:00 | ||
VPN Attacks | 00:38:00 | ||
Defeating SSL | 00:48:00 | ||
IDS/IPS Evasion | 01:11:00 | ||
Penetration Testing II | |||
Logistics of Pen Testing | FREE | 00:25:00 | |
Linux Fundamentals | 00:22:00 | ||
Information Gathering | 00:38:00 | ||
Detecting Live Systems | 00:34:00 | ||
Enumeration | 00:25:00 | ||
Vulnerability Assessments | 00:20:00 | ||
Malware Goes Undercover | 00:28:00 | ||
Windows Hacking | 00:39:00 | ||
Hacking UNIX/Linux | 00:36:00 | ||
Advanced Exploitation Techniques | 00:28:00 | ||
Pen Testing Wireless Networks | 00:34:00 | ||
Networks, Sniffing and IDS | 00:42:00 | ||
Injecting the Database | 00:26:00 | ||
Attacking Web Technologies | 00:30:00 | ||
Project Documentation | 00:17:00 | ||
Web Application Security | |||
Web Application Security | FREE | 01:20:00 | |
Secure SDLC | 00:26:00 | ||
OWASP TOP 10 | 00:28:00 | ||
Risk Management | 00:35:00 | ||
Threat Modeling | 00:18:00 | ||
Authentication and Authorization Attacks | 00:24:00 | ||
Session Management | 00:35:00 | ||
Security Architecture | 00:29:00 | ||
Input Validation and Data Sanitization | 00:24:00 | ||
AJAX Security | 00:05:00 | ||
Insecurity Code Discovery and Mitigation | 00:39:00 | ||
Application Mapping | 00:07:00 | ||
Cryptography | 00:28:00 | ||
Testing Methodologies | 00:31:00 | ||
Security Leadership | |||
Security Management | FREE | 00:58:00 | |
Risk Management | 00:35:00 | ||
Encryption | 00:31:00 | ||
Information Security - Access Control Concepts | 00:31:00 | ||
Incident Handling and Evidence | 01:01:00 | ||
Operations Security | 00:48:00 | ||
Knowing Network Security | 01:12:00 | ||
Security Sentinel | |||
Basic Security | FREE | 00:17:00 | |
User Awareness | 00:27:00 | ||
Implementing Countermeasures | 00:09:00 | ||
Certified Security Sentinel | 00:16:00 | ||
Using the Internet at Work | 00:23:00 | ||
Accessing the Company's Network Through Your Assigned Computer | 00:19:00 | ||
Accessing the Corporate Network Remotely | 00:09:00 | ||
Social Engineering | 00:13:00 | ||
Understanding and Manipulating our Target | 00:16:00 | ||
Researching Our Target | 00:11:00 | ||
Vulnerability Assessment | |||
Why Vulnerability Assessment | FREE | 00:46:00 | |
Vulnerability Types | 00:23:00 | ||
Assessing the Network | 00:40:00 | ||
Assessing Web Servers & Applications | 00:27:00 | ||
Assessing Remote & VPN Services | 00:17:00 | ||
Vulnerability Assessment Tools of the Trade | 00:15:00 | ||
Output Analysis | 00:12:00 | ||
Mock Exam | |||
Mock Exam- Cyber Security Officer Training - Complete Video Course | 00:30:00 | ||
Final Exam | |||
Final Exam- Cyber Security Officer Training - Complete Video Course | 00:30:00 | ||
Order Your Certificates and Transcripts | |||
Order Your Certificates and Transcripts | 00:00:00 |