Cyber Security Course Schedule

Page 1


COURSE SCHEDULE CyberSecurity

SCHEDULEUNTIL20DECEMBER2024

LEARNERINFORMATION

LearnerInformation

Wehopeyou'reexcitedtostartlearningwithourCyberSecurityL3.

There'safewrulesyou'llneedtofollowwhenbookinginyourstudysessionssopleasemakesureofthefollowingwhen lookingatyourtimetableandsequencelist:

YOUMUSTCOMPLETEUNITSA1-A6BEFORE PROGRESSINGONTOSECTIONSB-I.

YOUNEEDTOCOMPLETESECTIONSA-GBEFOREUNDERTAKINGHANDI.

SECTIONSANDZCANBECOMPLETEDINANYORDER.

Thismeansthateachweekyoucanchoosebetweentheavailableunitsessionsshownonthetimetablebutyoumustfollowthe rulesabove.

We'llberecordingallofourlivesessionsandyou’llhaveaccesstotheseonceyou’veattendedlivesoyoucanreferbackto themshouldyouneedto.

UNITSEQUENCE

A | Introduction to Cyber Security

C | Threat Models

D | Cyber Security Testing

Comparisons of Different Testing Methods, Strategies & Practice

Identification of a Vulnerability

Why Retest & Report?

Application of a Correct Response

B | Malicious Software

You’llstartthecoursewithunitsA1-A YouneedtocompletesectionsA-G beforecompletingHandI.

E | Incident Response

The Purpose of a Post Mortem Report E4 The Importance of Integrity, Rigour and Discipline in a Post Mortem

F1

F | Standards and Ethics

Eachunitis2.5hoursdelivered liveviaZoom

G | Working in the Cyber Security Sector

H | Case Studies

SectionsA-Imustbeundertakenin numericalorder.SandZunitscanbe completedinanyorder.

TIMETABLE COURSE

TIMETABLE COURSE

Thisisarollingschedule,further datesfollowingasimilarpatternwill bereleasedonaregularbasis

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.