Cyber security specialist complete video course john academy

Page 1

2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

LOGIN

HOME / COURSE / TECHNOLOGY / VIDEO COURSE / CYBER SECURITY SPECIALIST - COMPLETE VIDEO COURSE

Cyber Security Specialist - Complete Video Course ( 10 REVIEWS ) 

483 STUDENTS

Description: Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It …

TAKE THIS COURSE

£350.00 £69.00

1 YEAR

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

 1/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

ADVANCED COURSE BADGE COURSE CERTIFICATE

218

NUMBER OF UNITS

0

NUMBER OF QUIZZES

2 DAYS, 23 HOURS

HOME

  

CURRICULUM

REVIEWS

Description: Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security Specialist – Complete Video Course covers a detailed and complete instruction for becoming a cybersecurity expert and also prepares you for the di erent exams of cyber security so that you can able to obtain a world-class certi cation for carrying out your job. Any cybersecurity system starts with the task of identifying threats. In the rst part of the video lesson, you will know to detect threats and learn how to respond to the threats. Then, you will learn the proper ways of securing your WLAN network. In the section Certi ed Information Security Manager (CISM), you will train to be a good security manager. Here, you will know how to manage, design, oversee and assess an enterprise’s information security. Next, you will learn the procedures of protecting data and personal information of the patients in the Healthcare Information Systems Security Practitioner (CHISSP) section. After that, the course presents the information related to IT recovery strategy if any disaster happens to your company. Similarly, you will also learn about computer forensic incidents for investing cybercrime. You will know how to handle any incidents in the next section. Besides, the course guides you to be a security leadership o cer so that you can lead the team for cybersecurity by the knowledge of risk management, encryption, and information security. Finally, the last section helps you to be a certi ed Security Sentinel so that you can keep your companies information safe and secure.

Assessment: https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

2/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your nal exam you will have the opportunity to test your pro ciency with a mock exam.

Certi cation: After completing and passing the course successfully, you will be able to obtain an Accredited Certi cate of Achievement. Certi cates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Who is this Course for? Cyber Security Specialist – Complete Video Course is certi ed by CPD Quali cations Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and quali cation required for this course, it is available for all students from any academic background.

Requirements Our Cyber Security Specialist – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path After completing this course you will be able to build up accurate knowledge and skills with proper con dence to enrich yourself and brighten up your career in the relevant job market. COURSE CURRICULUM

Overview of Wireless Communications

Identify the Importance of Risk Management

00:11:00

Assess Risk

00:13:00

Mitigate Risk

00:22:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

3/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Integrate Documentation into Risk Management

00:14:00

Analyzing the Threat Landscape

Classify Threats and Threat Pro les

00:07:00

Perform Ongoing Threat Research

00:12:00

Resources that Aid in Research of Threats

00:03:00

Analyzing Recon Threats to Computing and Network Environments

Implement Threat Modeling

00:09:00

Assess the Impact of Reconnaissance Incidents

00:10:00

Performing Reconnaissance on a Network

00:07:00

Examining Reconnaissance Incidents

00:08:00

Assess the Impact of Social Engineering

00:10:00

Assessing the impact of Social Engineering

00:07:00

Assessing the Impact of Phishing

00:03:00

Analyzing Attacks on Computing and Network Environments

Assess the Impact of System Hacking Attacks

00:10:00

Cracking Passwords Using a Password File

00:08:00

Assess the Impact of Web Based Attacks

00:11:00

Assessing the Impact of Web-Based Threats

00:03:00

Assess the Impact of Malware

00:08:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

4/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Malware Detection and Removal

00:05:00

Assess the Impact of Hijacking and Impersonation Attacks

00:13:00

Assess the Impact of DoS Incidents

00:09:00

Assessing the Impact of DoS Attacks

00:04:00

Assess the Impact of Threats to Mobile Security

00:08:00

Assess the Impact of Threats to Cloud Security

00:10:00

Analyzing Post-Attack Techniques

Assess Command and Control Techniques

00:08:00

Assessing Command and Control Techniques

00:10:00

Assess Persistence Techniques

00:05:00

Detecting Rootkits

00:03:00

Assess Lateral Movement and Pivoting Techniques

00:13:00

Assess Data Ex ltration Techniques

00:04:00

Steganography

00:03:00

Assess Anti Forensics Techniques

00:09:00

Assessing Anti-Forensics

00:03:00

Evaluating the Organization’s Security Posture

Conduct Vulnerability Assessments

00:16:00

Perform a Vulnerability Scan with Nessus

00:07:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

5/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Perform a Vulnerability Scan with MBSA

00:05:00

Conduct Penetration Tests on Network Assets

00:18:00

Follow Up on Penetration Testing

00:06:00

Collecting Cyber security Intelligence

Deploy a Security Intelligence Collection and Analysis Platform

00:19:00

Collect Data from Network Based Intelligence Sources

00:15:00

Collecting Network-Based Security Intelligence

00:07:00

Collect Data from Host Based Intelligence Sources

00:13:00

Collecting Host-Based Security Intelligence

00:15:00

Parsing Log les

00:03:00

Analyzing Log Data

Use Common Tools to Analyze Logs

00:22:00

Analyzing Linux Logs for Security Intelligence

00:08:00

Use SIEM Tools for Analysis

00:07:00

Incorporating SIEMs into Security Intelligence Analysis

00:18:00

Parse Log Files with Regular Expressions

00:25:00

Performing Active Asset and Network Analysis

Analyze Incidents with Windows-Based Tools

00:17:00

Windows-Based Incident Analysis Tools

00:19:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

6/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Analyze Incidents with Linux Based Tools

00:05:00

Linux-Based Incident Analysis Tools

00:07:00

Analyze Malware

00:11:00

Analyzing Malware

00:03:00

Analyze Indicators of Compromise

00:20:00

Analyzing Indicators of Compromise

00:15:00

Responding to Cyber security Incidents

Deploy an Incident Handling and Response Architecture

00:22:00

Mitigate Incidents

00:16:00

Hardening Windows Servers

00:14:00

DNS Filtering

00:05:00

Blacklisting and Whitelisting

00:09:00

Prepare for Forensic Investigation as a CSIRT

00:03:00

Investigating Cyber security Incidents

Apply a Forensic Investigation Plan

00:10:00

Securely Collect and Analyze Electronic Evidence

00:08:00

Securely Collecting Electronic Evidence

00:05:00

Analyzing Forensic Evidence

00:07:00

Follow Up on the Results of an Investigation

00:04:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

7/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

WLAN Security Overview

WLAN Security Overview and Data Privacy

00:58:00

Networking Basics

00:04:00

Web GUI Introduction

00:05:00

Security Options

00:03:00

Legacy Security

Legacy Security

00:32:00

VPNs

00:21:00

Security Association

00:09:00

MAC Spoo ng

00:07:00

Encryption Ciphers and Methods

Encryption Ciphers and Methods

00:19:00

TKIP

00:26:00

CCMP

00:20:00

Encryption Examples

00:06:00

802.11 Authentication Methods

802.11 Authentication Methods

00:26:00

802.1X

00:20:00

EAP

00:25:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

8/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Certi ed Authority Server Credentials

00:06:00

Dynamic Encryption Key Generation

Dynamic Encryption Key Generation

00:21:00

Authentication and Key Management

00:13:00

RSNA Key Hierarchy

00:12:00

EAP

00:05:00

Information Elements

00:06:00

SOHO 802.11 Security

SOHO 802.11 Security

00:26:00

Wi-Fi Protected Setup (WPS)

00:20:00

Cracking Hashes

00:09:00

Fast Secure Roaming

Fast Secure Roaming

00:24:00

PMKSA

00:29:00

FT Key Hierarchy (e-notes)

00:30:00

802.11K-2008

00:28:00

Wireless Security Risks

Wireless Security Risks

00:22:00

Authentication Attacks

00:20:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

9/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Rogue Devices

00:04:00

Public Hotspots

00:06:00

00:28:00

Wireless LAN Security Auditing

Wireless LAN Security Auditing

Wireless Security Monitoring

Wireless Security Monitoring

00:21:00

Device Tracking

00:17:00

VPNs, Remote Access and Guest Access Services

VPNs, Remote Access and Guest Access Services

00:23:00

Remote Access

00:14:00

WLAN Security Infrastructure

WLAN Security Infrastructure

00:37:00

Management Protocols

00:23:00

Other RADIUS Solutions

00:15:00

Wireless Security Policies

Wireless Security Policies

00:17:00

Other Policies

00:14:00

00:25:00

Information Security Governance

Information Security Governance Overview

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

10/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

E ective Information Security Governance

00:24:00

Information Security Concepts and Technologies

00:20:00

Information Security Manager

00:09:00

Scope and Charter of Information Security Governance

00:10:00

Information Security Governance Metrics

00:23:00

Information Security Strategy Overview

00:02:00

Creating Information Security Strategy

00:36:00

Determining Current State Of Security

00:06:00

Information Security Strategy Development

00:10:00

Strategy Resources

00:40:00

Strategy Constraints

00:07:00

Action Plan to Implement Strategy

00:20:00

Information Risk Management

Risk Management Overview

00:16:00

Good Information Security Risk Management

00:15:00

Information Security Risk Management Concepts

00:13:00

Implementing Risk Management

00:17:00

Risk Assessment

00:39:00

Controls Countermeasures

00:23:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

11/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Recovery Time Objectives

00:18:00

Risk Monitoring and Communication

00:04:00

Information Security Program Development

Development of Information Security Program

00:11:00

Information Security Program Objectives

00:09:00

Information Security Program Development Concepts

00:14:00

Scope and Charter of Information Security Program Development

00:22:00

Information Security Management Framework

00:16:00

Information Security Framework Components

00:12:00

Information Security Program Resources

01:04:00

Implementing an Information Security Program

00:27:00

Information Infrastructure and Architecture

00:14:00

Information Security Program

00:14:00

Security Program Services and Operational Activities

00:45:00

Information Security Incident Management

Incident Management Overview

00:28:00

Incident Response Procedures

00:29:00

Incident Management Organization

00:19:00

Incident Management Resources

00:36:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

12/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Incident Management Objectives

00:14:00

Incident Management Metrics and Indicators

00:17:00

Current State of Incident Response Capability

00:11:00

Current State of Incident Response Capability

00:11:00

BCP DRP

00:36:00

Testing Response and Recovery Plans

00:10:00

Executing the Plan

00:27:00

Healthcare Information Systems Security

The Healthcare Industry

01:25:00

The Healthcare Regulatory Environment

01:51:00

Privacy and Security in Healthcare

01:31:00

Information Governance and Risk Management

01:18:00

Information Risk Assessment

00:52:00

Third-Party Risk Management

01:18:00

Disaster Recovery

Welcome to Disaster Recovery Training

00:26:00

Business Impact Analysis

00:24:00

Risk Analysis8

00:12:00

BCP Strategies

00:27:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

13/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

IT Recovery Strategies

00:27:00

Implementation Phase

00:09:00

Testing and Exercise

00:07:00

Maintenance and Updating

00:06:00

Execution Phase

00:07:00

Digital Forensics Examination

Introduction

00:13:00

Computer Forensic Incidents

00:28:00

Investigation Process

00:54:00

Disk Storage Concepts

00:30:00

Digital Acquisition & Analysis

00:24:00

Forensic Examination Protocols

00:25:00

Digital Evidence Protocols

00:21:00

CFI Theory

00:25:00

Digital Evidence Presentation

00:22:00

Computer Forensic Laboratory Protocols

00:33:00

Computer Forensic Processing

00:22:00

Digital Forensics Reporting

00:20:00

Specialized Artifact Recovery

00:46:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

14/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Discovery and ESI

00:12:00

Cell Phone Forensics

00:21:00

USB Forensics

00:06:00

Incident Handling

00:36:00

PDA Forensics

00:23:00

Investigating Harassment

00:14:00

Incident Handling Engineer

Introduction

00:09:00

Threats, Vulnerabilities and Exploits

00:48:00

IH Preparation

00:45:00

Request Tracker for Incident Handling

00:12:00

Preliminary Response

00:30:00

Identi cation and Initial Response

00:12:00

Sysinternals

00:13:00

Containment

00:16:00

Eradication

00:29:00

Follow-up

00:12:00

Recovery

00:16:00

Virtualization Security

00:13:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

15/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Malware Incident Handling

Security Leadership O

01:14:00

cer

Security Management

00:58:00

Risk Management

00:35:00

Encryption

00:31:00

Information Security – Access Control Concepts

00:31:00

Incident Handling and Evidence

01:01:00

Operations Security

00:48:00

Knowing Network Security

01:12:00

Security Sentinel

Basic Security

00:17:00

User Awareness

00:27:00

Implementing Countermeasures

00:09:00

Certi ed Security Sentinel

00:16:00

Using the Internet at Work

00:23:00

Accessing the Company’s Network Through Your Assigned Computer

00:19:00

Accessing the Corporate Network Remotely

00:09:00

Social Engineering

00:13:00

Understanding and Manipulating our Target

00:16:00

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

16/17


2/17/2018

Cyber Security Specialist - Complete Video Course - John Academy

Researching Our Target

00:11:00

Mock Exam Final Exam

COURSE REVIEWS

4.9   10 ratings

5 STARS

0

4 STARS

0

3 STARS

0

2 STARS

0

1 STARS

0

NO REVIEWS FOUND FOR THIS COURSE.

RELATED COURSES

https://www.johnacademy.co.uk/course/cyber-security-specialist-complete-video-course/

17/17


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.