Global Certificate in Cybersecurity: Addressing Emerging Risks
-- ViewingNowThe Global Certificate in Cybersecurity: Addressing Emerging Risks equips learners with essential skills to tackle the ever-evolving cybersecurity threats. This course highlights the importance of robust cybersecurity measures in our interconnected world.
4.023+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
รber diesen Kurs
100% online
Lernen Sie von รผberall
Teilbares Zertifikat
Zu Ihrem LinkedIn-Profil hinzufรผgen
2 Monate zum Abschlieรen
bei 2-3 Stunden pro Woche
Jederzeit beginnen
Keine Wartezeit
Kursdetails
โข Cybersecurity Fundamentals: An introduction to the core concepts and principles of cybersecurity, including threat assessment, vulnerability identification, and risk management.
โข Emerging Cyber Threats: An exploration of the latest and most significant cyber threats, such as advanced persistent threats (APTs), zero-day exploits, and ransomware attacks.
โข Network Security: Best practices and strategies for securing network infrastructure, including firewalls, intrusion detection/prevention systems, and virtual private networks (VPNs).
โข Endpoint Security: Techniques and tools for protecting endpoints such as desktops, laptops, and mobile devices from cyber attacks, including antivirus software, patch management, and data encryption.
โข Identity and Access Management: Strategies for managing user identities and access to systems and data, including authentication, authorization, and accountability (AAA) frameworks, multi-factor authentication (MFA), and privileged access management (PAM).
โข Incident Response and Disaster Recovery: Processes and procedures for responding to and recovering from cybersecurity incidents, including incident response planning, forensic analysis, and disaster recovery planning.
โข Security Governance and Compliance: An overview of the legal, regulatory, and ethical frameworks that govern cybersecurity, including data protection laws, industry standards, and best practices for compliance.
โข Cloud Security: Strategies for securing cloud-based infrastructure and applications, including cloud security architecture, identity and access management in the cloud, and data protection in the cloud.
โข Cyber Threat Intelligence: Techniques and tools for collecting, analyzing, and acting on intelligence about cyber threats, including threat intelligence platforms, open-source intelligence (OSINT), and cyber threat hunting.
โข Ethical Hacking and Penetration Testing: Methodologies and tools for identifying vulnerabilities in systems and applications through ethical hacking and penetration testing, including OWASP Top 10, Metasploit
Karriereweg