• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Cyber Security Officer Training - Complete Video Course

Cyber Security Officer Training - Complete Video Course

By John Academy

4.3(43)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 46 hours

  • All levels

Description

Description:

The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity.

The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company.

Assessment:
  • At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.

  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:
  • After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.

  • Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Who is this Course for?

Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Requirements

Our Cyber Security Officer Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Ethical Hacking

Overview

FREE

00:35:00

Reconnaissance

00:25:00

Protocols

01:25:00

Windows Hacking

01:19:00

Attacking Web Technologies

00:56:00

Pen Testing Wireless Networks

01:34:00

Professional Hacking

Security Fundamentals

FREE

00:51:00

Access Controls

00:33:00

Protocols

00:36:00

Cryptography

00:52:00

Why Vulnerability Assessments?

00:36:00

Vulnerability Tools of the Trade

00:10:00

Output Analysis and Reports

00:13:00

Reconnaisance, Enumeration and Scanning

00:51:00

Gaining Access

00:31:00

Maintaining Access

00:17:00

Covering Tracks

00:18:00

Malware

00:09:00

Buffer Overflows

00:22:00

Password Cracking

00:33:00

Penetration Testing I

Packet Capturing

00:38:00

Layer 2 Attacks

00:59:00

Layer 3 Attacks on Cisco Based Infrastructures

01:09:00

Pivoting and Relays

00:20:00

IPv6 Attacks

00:49:00

VPN Attacks

00:38:00

Defeating SSL

00:48:00

IDS/IPS Evasion

01:11:00

Penetration Testing II

Logistics of Pen Testing

FREE

00:25:00

Linux Fundamentals

00:22:00

Information Gathering

00:38:00

Detecting Live Systems

00:34:00

Enumeration

00:25:00

Vulnerability Assessments

00:20:00

Malware Goes Undercover

00:28:00

Windows Hacking

00:39:00

Hacking UNIX/Linux

00:36:00

Advanced Exploitation Techniques

00:28:00

Pen Testing Wireless Networks

00:34:00

Networks, Sniffing and IDS

00:42:00

Injecting the Database

00:26:00

Attacking Web Technologies

00:30:00

Project Documentation

00:17:00

Web Application Security

Web Application Security

FREE

01:20:00

Secure SDLC

00:26:00

OWASP TOP 10

00:28:00

Risk Management

00:35:00

Threat Modeling

00:18:00

Authentication and Authorization Attacks

00:24:00

Session Management

00:35:00

Security Architecture

00:29:00

Input Validation and Data Sanitization

00:24:00

AJAX Security

00:05:00

Insecurity Code Discovery and Mitigation

00:39:00

Application Mapping

00:07:00

Cryptography

00:28:00

Testing Methodologies

00:31:00

Security Leadership

Security Management

FREE

00:58:00

Risk Management

00:35:00

Encryption

00:31:00

Information Security - Access Control Concepts

00:31:00

Incident Handling and Evidence

01:01:00

Operations Security

00:48:00

Knowing Network Security

01:12:00

Security Sentinel

Basic Security

FREE

00:17:00

User Awareness

00:27:00

Implementing Countermeasures

00:09:00

Certified Security Sentinel

00:16:00

Using the Internet at Work

00:23:00

Accessing the Company's Network Through Your Assigned Computer

00:19:00

Accessing the Corporate Network Remotely

00:09:00

Social Engineering

00:13:00

Understanding and Manipulating our Target

00:16:00

Researching Our Target

00:11:00

Vulnerability Assessment

Why Vulnerability Assessment

FREE

00:46:00

Vulnerability Types

00:23:00

Assessing the Network

00:40:00

Assessing Web Servers & Applications

00:27:00

Assessing Remote & VPN Services

00:17:00

Vulnerability Assessment Tools of the Trade

00:15:00

Output Analysis

00:12:00

Mock Exam

Mock Exam- Cyber Security Officer Training - Complete Video Course

00:30:00

Final Exam

Final Exam- Cyber Security Officer Training - Complete Video Course

00:30:00

Order Your Certificates and Transcripts

Order Your Certificates and Transcripts

00:00:00

About The Provider

Tags

Reviews