Cademy logoCademy Marketplace

Course Images

Cyber Security Training - Online Course

Cyber Security Training - Online Course

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • All levels

Description

Cyber Security Training - Online Course

This online Cyber Security training course will help you to understand the potential impact of common cyber threats. It outlines safe behaviour on the Internet and also identifies what steps you can take to protect yourself and your organisation from cyber attacks.

Almost everyone spends some portion of their day online. Criminals target mobile and desktop devices and networks for illegal gains in various ways. This criminal activity, cyber-crime , is constantly changing and growing. This online course keeps you up to date with the latest developments in personal cyber security.

To stay safe online, you need to understand the main types of cyber-crime, how you can be targeted and what you can do to protect yourself.

What is Cyber Security?

Cyber security is the application of technologies, processes, and controls to protect computers and networks from potential cyber-attacks. It aims to reduce the risk of these attacks and protect against the unauthorised exploitation of computer systems.

Sound knowledge and understanding of cyber security will help protect you against malicious attacks to access, change or delete sensitive data. Cyber security is used as a tool to prevent attacks that aim to disable or tamper with a computer system's operations.

What are the learning outcomes for the Cyber Security course?

At the end of the cyber security course, you will be able to:

  • Recognise and understand the potential impact of common cyber threats.
  • Outline safe behaviour on the Internet.
  • Take steps to protect yourself and your organisation from cyber attacks.

Introduction to Cyber Security

The first topic introduces you to cyber security. It identifies who can be a target and who commits this type of crime. You will learn about how human behaviour creates risks and specific risks associated with the Internet of Things. Lastly, the topic explains how data protection laws affect you with respect to cyber-crime.

Brute Force Attacks

The second topic is about brute force attacks. You will also learn about secure passwords and how social media is used by hackers.

Internet Cookies

The third topic explains why cookies are important and what they do. It also identifies risks of allowing cookies and what you can do to minimise these risks.

Social Engineering Attacks

Topic 4 describes four kinds of social engineering - tailgating, phishing, baiting and chat-in-the-middle. You will also learn how to protect yourself from phishing attacks.

Malware

Topic 5 describes malware - viruses, worms, Trojans, logic bombs and ransomware. It also covers ways you can defend against malware attacks.

Grayware

Topic 6 explains how grayware works - For example, adware, keyloggers, bots and botnets - and how to reduce grayware on your device.

Identity theft

Finally, the topic explains how criminals steal identities and what they do with them. It also identifies the warning signs that indicate you may be a victim of identity theft and explains what to do if your identity is stolen.

About The Provider

i2Comply
i2Comply
Daventry
i2Comply | Online Training Courses - Bespoke Online Training i2Comply provide easy to use and cost effective certified online training courses, with certificates available to download. Discover all our courses here.
Read more about i2Comply

Tags

Reviews