2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
LOGIN
HOME / COURSE / TECHNOLOGY / VIDEO COURSE / CYBER SECURITY SPECIALIST - COMPLETE VIDEO COURSE
Cyber Security Specialist - Complete Video Course ( 10 REVIEWS )
483 STUDENTS
Description: Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It …
TAKE THIS COURSE
£350.00 £69.00
1 YEAR
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
1/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
ADVANCED COURSE BADGE COURSE CERTIFICATE
218
NUMBER OF UNITS
0
NUMBER OF QUIZZES
2 DAYS, 23 HOURS
HOME
CURRICULUM
REVIEWS
Description: Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security Specialist – Complete Video Course covers a detailed and complete instruction for becoming a cybersecurity expert and also prepares you for the di erent exams of cyber security so that you can able to obtain a world-class certi cation for carrying out your job. Any cybersecurity system starts with the task of identifying threats. In the rst part of the video lesson, you will know to detect threats and learn how to respond to the threats. Then, you will learn the proper ways of securing your WLAN network. In the section Certi ed Information Security Manager (CISM), you will train to be a good security manager. Here, you will know how to manage, design, oversee and assess an enterprise’s information security. Next, you will learn the procedures of protecting data and personal information of the patients in the Healthcare Information Systems Security Practitioner (CHISSP) section. After that, the course presents the information related to IT recovery strategy if any disaster happens to your company. Similarly, you will also learn about computer forensic incidents for investing cybercrime. You will know how to handle any incidents in the next section. Besides, the course guides you to be a security leadership o cer so that you can lead the team for cybersecurity by the knowledge of risk management, encryption, and information security. Finally, the last section helps you to be a certi ed Security Sentinel so that you can keep your companies information safe and secure.
Assessment: https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
2/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your nal exam you will have the opportunity to test your pro ciency with a mock exam.
Certi cation: After completing and passing the course successfully, you will be able to obtain an Accredited Certi cate of Achievement. Certi cates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Who is this Course for? Cyber Security Specialist – Complete Video Course is certi ed by CPD Quali cations Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and quali cation required for this course, it is available for all students from any academic background.
Requirements Our Cyber Security Specialist – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
Career Path After completing this course you will be able to build up accurate knowledge and skills with proper con dence to enrich yourself and brighten up your career in the relevant job market. COURSE CURRICULUM
Overview of Wireless Communications
Identify the Importance of Risk Management
00:11:00
Assess Risk
00:13:00
Mitigate Risk
00:22:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
3/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Integrate Documentation into Risk Management
00:14:00
Analyzing the Threat Landscape
Classify Threats and Threat Pro les
00:07:00
Perform Ongoing Threat Research
00:12:00
Resources that Aid in Research of Threats
00:03:00
Analyzing Recon Threats to Computing and Network Environments
Implement Threat Modeling
00:09:00
Assess the Impact of Reconnaissance Incidents
00:10:00
Performing Reconnaissance on a Network
00:07:00
Examining Reconnaissance Incidents
00:08:00
Assess the Impact of Social Engineering
00:10:00
Assessing the impact of Social Engineering
00:07:00
Assessing the Impact of Phishing
00:03:00
Analyzing Attacks on Computing and Network Environments
Assess the Impact of System Hacking Attacks
00:10:00
Cracking Passwords Using a Password File
00:08:00
Assess the Impact of Web Based Attacks
00:11:00
Assessing the Impact of Web-Based Threats
00:03:00
Assess the Impact of Malware
00:08:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
4/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Malware Detection and Removal
00:05:00
Assess the Impact of Hijacking and Impersonation Attacks
00:13:00
Assess the Impact of DoS Incidents
00:09:00
Assessing the Impact of DoS Attacks
00:04:00
Assess the Impact of Threats to Mobile Security
00:08:00
Assess the Impact of Threats to Cloud Security
00:10:00
Analyzing Post-Attack Techniques
Assess Command and Control Techniques
00:08:00
Assessing Command and Control Techniques
00:10:00
Assess Persistence Techniques
00:05:00
Detecting Rootkits
00:03:00
Assess Lateral Movement and Pivoting Techniques
00:13:00
Assess Data Ex ltration Techniques
00:04:00
Steganography
00:03:00
Assess Anti Forensics Techniques
00:09:00
Assessing Anti-Forensics
00:03:00
Evaluating the Organization’s Security Posture
Conduct Vulnerability Assessments
00:16:00
Perform a Vulnerability Scan with Nessus
00:07:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
5/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Perform a Vulnerability Scan with MBSA
00:05:00
Conduct Penetration Tests on Network Assets
00:18:00
Follow Up on Penetration Testing
00:06:00
Collecting Cyber security Intelligence
Deploy a Security Intelligence Collection and Analysis Platform
00:19:00
Collect Data from Network Based Intelligence Sources
00:15:00
Collecting Network-Based Security Intelligence
00:07:00
Collect Data from Host Based Intelligence Sources
00:13:00
Collecting Host-Based Security Intelligence
00:15:00
Parsing Log les
00:03:00
Analyzing Log Data
Use Common Tools to Analyze Logs
00:22:00
Analyzing Linux Logs for Security Intelligence
00:08:00
Use SIEM Tools for Analysis
00:07:00
Incorporating SIEMs into Security Intelligence Analysis
00:18:00
Parse Log Files with Regular Expressions
00:25:00
Performing Active Asset and Network Analysis
Analyze Incidents with Windows-Based Tools
00:17:00
Windows-Based Incident Analysis Tools
00:19:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
6/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Analyze Incidents with Linux Based Tools
00:05:00
Linux-Based Incident Analysis Tools
00:07:00
Analyze Malware
00:11:00
Analyzing Malware
00:03:00
Analyze Indicators of Compromise
00:20:00
Analyzing Indicators of Compromise
00:15:00
Responding to Cyber security Incidents
Deploy an Incident Handling and Response Architecture
00:22:00
Mitigate Incidents
00:16:00
Hardening Windows Servers
00:14:00
DNS Filtering
00:05:00
Blacklisting and Whitelisting
00:09:00
Prepare for Forensic Investigation as a CSIRT
00:03:00
Investigating Cyber security Incidents
Apply a Forensic Investigation Plan
00:10:00
Securely Collect and Analyze Electronic Evidence
00:08:00
Securely Collecting Electronic Evidence
00:05:00
Analyzing Forensic Evidence
00:07:00
Follow Up on the Results of an Investigation
00:04:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
7/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
WLAN Security Overview
WLAN Security Overview and Data Privacy
00:58:00
Networking Basics
00:04:00
Web GUI Introduction
00:05:00
Security Options
00:03:00
Legacy Security
Legacy Security
00:32:00
VPNs
00:21:00
Security Association
00:09:00
MAC Spoo ng
00:07:00
Encryption Ciphers and Methods
Encryption Ciphers and Methods
00:19:00
TKIP
00:26:00
CCMP
00:20:00
Encryption Examples
00:06:00
802.11 Authentication Methods
802.11 Authentication Methods
00:26:00
802.1X
00:20:00
EAP
00:25:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
8/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Certi ed Authority Server Credentials
00:06:00
Dynamic Encryption Key Generation
Dynamic Encryption Key Generation
00:21:00
Authentication and Key Management
00:13:00
RSNA Key Hierarchy
00:12:00
EAP
00:05:00
Information Elements
00:06:00
SOHO 802.11 Security
SOHO 802.11 Security
00:26:00
Wi-Fi Protected Setup (WPS)
00:20:00
Cracking Hashes
00:09:00
Fast Secure Roaming
Fast Secure Roaming
00:24:00
PMKSA
00:29:00
FT Key Hierarchy (e-notes)
00:30:00
802.11K-2008
00:28:00
Wireless Security Risks
Wireless Security Risks
00:22:00
Authentication Attacks
00:20:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
9/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Rogue Devices
00:04:00
Public Hotspots
00:06:00
00:28:00
Wireless LAN Security Auditing
Wireless LAN Security Auditing
Wireless Security Monitoring
Wireless Security Monitoring
00:21:00
Device Tracking
00:17:00
VPNs, Remote Access and Guest Access Services
VPNs, Remote Access and Guest Access Services
00:23:00
Remote Access
00:14:00
WLAN Security Infrastructure
WLAN Security Infrastructure
00:37:00
Management Protocols
00:23:00
Other RADIUS Solutions
00:15:00
Wireless Security Policies
Wireless Security Policies
00:17:00
Other Policies
00:14:00
00:25:00
Information Security Governance
Information Security Governance Overview
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
10/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
E ective Information Security Governance
00:24:00
Information Security Concepts and Technologies
00:20:00
Information Security Manager
00:09:00
Scope and Charter of Information Security Governance
00:10:00
Information Security Governance Metrics
00:23:00
Information Security Strategy Overview
00:02:00
Creating Information Security Strategy
00:36:00
Determining Current State Of Security
00:06:00
Information Security Strategy Development
00:10:00
Strategy Resources
00:40:00
Strategy Constraints
00:07:00
Action Plan to Implement Strategy
00:20:00
Information Risk Management
Risk Management Overview
00:16:00
Good Information Security Risk Management
00:15:00
Information Security Risk Management Concepts
00:13:00
Implementing Risk Management
00:17:00
Risk Assessment
00:39:00
Controls Countermeasures
00:23:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
11/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Recovery Time Objectives
00:18:00
Risk Monitoring and Communication
00:04:00
Information Security Program Development
Development of Information Security Program
00:11:00
Information Security Program Objectives
00:09:00
Information Security Program Development Concepts
00:14:00
Scope and Charter of Information Security Program Development
00:22:00
Information Security Management Framework
00:16:00
Information Security Framework Components
00:12:00
Information Security Program Resources
01:04:00
Implementing an Information Security Program
00:27:00
Information Infrastructure and Architecture
00:14:00
Information Security Program
00:14:00
Security Program Services and Operational Activities
00:45:00
Information Security Incident Management
Incident Management Overview
00:28:00
Incident Response Procedures
00:29:00
Incident Management Organization
00:19:00
Incident Management Resources
00:36:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
12/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Incident Management Objectives
00:14:00
Incident Management Metrics and Indicators
00:17:00
Current State of Incident Response Capability
00:11:00
Current State of Incident Response Capability
00:11:00
BCP DRP
00:36:00
Testing Response and Recovery Plans
00:10:00
Executing the Plan
00:27:00
Healthcare Information Systems Security
The Healthcare Industry
01:25:00
The Healthcare Regulatory Environment
01:51:00
Privacy and Security in Healthcare
01:31:00
Information Governance and Risk Management
01:18:00
Information Risk Assessment
00:52:00
Third-Party Risk Management
01:18:00
Disaster Recovery
Welcome to Disaster Recovery Training
00:26:00
Business Impact Analysis
00:24:00
Risk Analysis8
00:12:00
BCP Strategies
00:27:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
13/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
IT Recovery Strategies
00:27:00
Implementation Phase
00:09:00
Testing and Exercise
00:07:00
Maintenance and Updating
00:06:00
Execution Phase
00:07:00
Digital Forensics Examination
Introduction
00:13:00
Computer Forensic Incidents
00:28:00
Investigation Process
00:54:00
Disk Storage Concepts
00:30:00
Digital Acquisition & Analysis
00:24:00
Forensic Examination Protocols
00:25:00
Digital Evidence Protocols
00:21:00
CFI Theory
00:25:00
Digital Evidence Presentation
00:22:00
Computer Forensic Laboratory Protocols
00:33:00
Computer Forensic Processing
00:22:00
Digital Forensics Reporting
00:20:00
Specialized Artifact Recovery
00:46:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
14/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Discovery and ESI
00:12:00
Cell Phone Forensics
00:21:00
USB Forensics
00:06:00
Incident Handling
00:36:00
PDA Forensics
00:23:00
Investigating Harassment
00:14:00
Incident Handling Engineer
Introduction
00:09:00
Threats, Vulnerabilities and Exploits
00:48:00
IH Preparation
00:45:00
Request Tracker for Incident Handling
00:12:00
Preliminary Response
00:30:00
Identi cation and Initial Response
00:12:00
Sysinternals
00:13:00
Containment
00:16:00
Eradication
00:29:00
Follow-up
00:12:00
Recovery
00:16:00
Virtualization Security
00:13:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
15/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Malware Incident Handling
Security Leadership O
01:14:00
cer
Security Management
00:58:00
Risk Management
00:35:00
Encryption
00:31:00
Information Security – Access Control Concepts
00:31:00
Incident Handling and Evidence
01:01:00
Operations Security
00:48:00
Knowing Network Security
01:12:00
Security Sentinel
Basic Security
00:17:00
User Awareness
00:27:00
Implementing Countermeasures
00:09:00
Certi ed Security Sentinel
00:16:00
Using the Internet at Work
00:23:00
Accessing the Company’s Network Through Your Assigned Computer
00:19:00
Accessing the Corporate Network Remotely
00:09:00
Social Engineering
00:13:00
Understanding and Manipulating our Target
00:16:00
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
16/17
2/17/2018
Cyber Security Specialist - Complete Video Course - John Academy
Researching Our Target
00:11:00
Mock Exam Final Exam
COURSE REVIEWS
4.9 10 ratings
5 STARS
0
4 STARS
0
3 STARS
0
2 STARS
0
1 STARS
0
NO REVIEWS FOUND FOR THIS COURSE.
RELATED COURSES
https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/
17/17