Cyber Security


Understand Cyber Security, types of threats resulting in cyber attacks, and defence mechanisms available.

Course CodeVIT103
Fee CodeS3
Duration (approx)100 hours
QualificationStatement of Attainment


It's Easy to Enrol

Select a Learning Method

I am studying from...

Enable Javascript to automatically update prices.

All prices in Australian Dollars.

Payment plans available.

Courses can be started at any time from anywhere in the world!

Digital literacy is essential in today's world. Learn about the traces we leave online, how to improve your digital privacy, and potential threats.

This course introduces the concept of Cyber Security, explains various types of threats available resulting in cyber attacks, and develops your understanding of the defence mechanisms available.

Lesson Structure

There are 11 lessons in this course:

  1. Introduction to Cyber Security and cyber attacks/defences
  2. Vulnerability Assessment
  3. Securing the facilities and networks
  4. Securing your online digital footprint
  5. Internet Security and Digital Certificates
  6. Wireless Network Vulnerabilities, Attacks and Security
  7. Firewalls, IDS and IPS
  8. Cryptography
  9. Access Control and Authentication
  10. Cyber attack Disaster Recovery strategies
  11. Ongoing Security Management

Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.

Aims

  • Define cyber security.
  • Explain the goals and importance of cyber security.
  • Understand important terminology relating to cyber security and list some attacks and defence mechanisms.
  • Explain how to perform a vulnerability assessment.
  • Understand the tools and techniques available.
  • Compare and contrast vulnerability scanning and penetration testing.
  • Explain how to secure physical data storage, data centre security, data warehouse and networks.
  • Understand the effects of leaving a wide online digital footprint.
  • Understand the options available for users to manage their online digital footprint.
  • Understand what a firewall, an Intrusion Detection System (IDS), and an Intrusion Prevention System (IPS) represent in the world of cyber security.
  • Explain the importance and functions of firewalls, IDS and IPS systems, and the benefits and protection they offer in protecting computers as well as computer networks.
  • Understand the concept of cryptography and the importance of encrypting and decrypting data.
  • Explain components of cryptographic protocols and common standards used in encryption and decryption.
  • Understand the importance of digital signatures and digital certificates in securing web traffic.
  • List the various types of wireless data communications networks and understand types of vulnerabilities and attacks against each of them.
  • Explain wireless network security standards available to protect wireless networks.
  • Define Access Control and become familiar with its terminology.
  • Understand the importance of implementing access control models.
  • Define authentication and understand the importance of creating and securing strong passwords and implementing double-factor or multi-factor authentication.
  • Explain how to recover from a cyber-attack and best procedures for setting up redundancy and quick recovery methods prior and after attack has occurred and minimizing impacts to systems and networks involved.

What You Will Do

  • Research layered defence concepts and in particular the idea of defence in depth.
  • Research and explain your choice of cyber-attack.
  • Report on good vulnerability scanners currently available in the market.
  • Research 4 privacy enhancing tools online, such as VPNs, password managers, and other encryption software.
  • Research the latest firewall solutions in the market.
  • Research the latest NIDS and HIDS solutions in the market.

Learn to assess vulnerability; then formulate and execute appropriate responses.

A vulnerability assessment often involves the 5 steps below:

  1. Identifying which assets need to be protected;
  2. Evaluating threats against those assets;
  3. Undertaking vulnerability appraisal to understand how susceptible the current protection method is;
  4. Assessing risks;
  5. Mitigating risks.
 


Need assistance?



Start Now!