Booking options
£27.99
£27.99
On-Demand course
6 hours 25 minutes
All levels
Cyber Security is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Cyber Security and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills.
Consisting of several modules, the course teaches you everything you need to succeed in this profession.
The course can be studied part-time. You can become accredited within 6 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website.
Some of our website features are:
This is a dedicated website for teaching
24/7 tutor support
Interactive Content
Affordable price
Courses accredited by the UK's top awarding bodies
100% online
Flexible deadline
No formal entry requirements. You need to have:
Passion for learning
A good understanding of the English language
Be motivated and hard-working
Over the age of 16.
CPD Certification from The Teachers Training
Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish.
You can get your digital certificate (PDF) for £4.99 only
Hard copy certificates are also available, and you can get one for only £10.99
You can get both PDF and Hard copy certificates for just £12.99!
The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs.
FUNDAMENTALS OF NETWORKING | |||
Network Topologies | 00:06:00 | ||
History and Applications of Computer Networking | 00:06:00 | ||
Protocols and Standards | 00:04:00 | ||
Introduction to OSI Model | 00:04:00 | ||
Layers of OSI Model | 00:07:00 | ||
Introduction to TCP/IP Model | 00:10:00 | ||
OSI Model vs TCP/IP Model | 00:04:00 | ||
Addressing in Computer Networks | 00:09:00 | ||
IP Address- IPv4 and IPv6 | 00:07:00 | ||
Classes of IP Address | 00:10:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC's IP ADDRESS | 00:03:00 | ||
PRACTICAL : HOW TO FIND OUT YOUR PC'S MAC ADDRESS | 00:05:00 | ||
The Internet Protocol (IP) | 00:07:00 | ||
Address Resolution Protocol (ARP) | 00:09:00 | ||
Dynamic Host Configuration Protocol (DHCP) | 00:08:00 | ||
Internet Control Message Protocol (ICMP) | 00:06:00 | ||
RIP and OSPF Protocols | 00:06:00 | ||
PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT | 00:03:00 | ||
What are Sockets? | 00:05:00 | ||
File Transfer Protocol (FTP) | 00:03:00 | ||
Hypertext Transfer Protocol (HTTP) | 00:04:00 | ||
Domain Name System (DNS) | 00:03:00 | ||
GETTING STARTED WITH CYBER SECURITY | |||
Definition of Computer Security | 00:03:00 | ||
Interesting Facts about Cyber Security | 00:05:00 | ||
History of Cyber Security | 00:07:00 | ||
Scope and Career Insights in Cyber Security | 00:08:00 | ||
LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY | |||
Introduction | 00:01:00 | ||
Types of Computer Security | 00:03:00 | ||
Key Terms in Cyber Security | 00:07:00 | ||
The Elements of Information Security | 00:06:00 | ||
Types of Attacks | 00:10:00 | ||
Roles in Cyber Security : Part 1 | 00:08:00 | ||
Roles in Cyber Security : Part 2 | 00:06:00 | ||
DIVING DEEP INTO CYBER SECURITY | |||
Security Architect's View of Security | 00:08:00 | ||
What is Vulnerability Assessment? | 00:05:00 | ||
4 Phases of Vulnerability Assessment | 00:09:00 | ||
Introduction to Cryptography | 00:06:00 | ||
Symmetric Encryption | 00:03:00 | ||
Asymmetric Encryption | 00:04:00 | ||
Hashing | 00:07:00 | ||
Security Organizations | 00:05:00 | ||
Critical Thinking in Cyber Security | 00:04:00 | ||
The Five Critical Thinking Skills | 00:06:00 | ||
PRACTICAL : USING NSLOOKUP TOOL | 00:03:00 | ||
TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES | |||
Different types of Actors in Cyber Security | 00:10:00 | ||
Types of Cyber Attacks | 00:04:00 | ||
Hacking Organizations around the Globe | 00:05:00 | ||
Security Services and Mechanisms | 00:03:00 | ||
Introduction to Threats | 00:03:00 | ||
What is a Malware? | 00:07:00 | ||
Types of Trojans | 00:06:00 | ||
Types of Virus | 00:07:00 | ||
Have you ever heard about a Ransomware? | 00:09:00 | ||
The Cyber Kill Chain | 00:09:00 | ||
Introduction to Social Engineering | 00:05:00 | ||
Types of Social Engineering | 00:07:00 | ||
KEY SECURITY CONCEPTS | |||
Confidentiality - The Most Important Element of Security | 00:04:00 | ||
Introduction to Incident Response Team | 00:05:00 | ||
Phases of Incident Response | 00:05:00 | ||
Laws in Cyber Security | 00:05:00 | ||
What are Audits in Cyber Security | 00:04:00 | ||
Internal Audit vs External Audit | 00:04:00 | ||
The NIST Framework | 00:03:00 | ||
The COBIT Framework | 00:04:00 | ||
FIREWALLS AND ANTIVIRUS | |||
Intrusion Detection System | 00:05:00 | ||
Introduction to Firewalls | 00:05:00 | ||
What is DMZ? | 00:04:00 | ||
Different types of Firewalls | 00:09:00 |