Global Certificate in Cybersecurity: Addressing Emerging Risks
-- ViewingNowThe Global Certificate in Cybersecurity: Addressing Emerging Risks equips learners with essential skills to tackle the ever-evolving cybersecurity threats. This course highlights the importance of robust cybersecurity measures in our interconnected world.
4,023+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
ě´ ęłźě ě ëí´
100% ě¨ëźě¸
ě´ëěë íěľ
ęłľě ę°ëĽí ě¸ěŚě
LinkedIn íëĄíě ěśę°
ěëŁęšě§ 2ę°ě
죟 2-3ěę°
ě¸ě ë ěě
ë기 ę¸°ę° ěě
ęłźě ě¸ëśěŹí
⢠Cybersecurity Fundamentals: An introduction to the core concepts and principles of cybersecurity, including threat assessment, vulnerability identification, and risk management.
⢠Emerging Cyber Threats: An exploration of the latest and most significant cyber threats, such as advanced persistent threats (APTs), zero-day exploits, and ransomware attacks.
⢠Network Security: Best practices and strategies for securing network infrastructure, including firewalls, intrusion detection/prevention systems, and virtual private networks (VPNs).
⢠Endpoint Security: Techniques and tools for protecting endpoints such as desktops, laptops, and mobile devices from cyber attacks, including antivirus software, patch management, and data encryption.
⢠Identity and Access Management: Strategies for managing user identities and access to systems and data, including authentication, authorization, and accountability (AAA) frameworks, multi-factor authentication (MFA), and privileged access management (PAM).
⢠Incident Response and Disaster Recovery: Processes and procedures for responding to and recovering from cybersecurity incidents, including incident response planning, forensic analysis, and disaster recovery planning.
⢠Security Governance and Compliance: An overview of the legal, regulatory, and ethical frameworks that govern cybersecurity, including data protection laws, industry standards, and best practices for compliance.
⢠Cloud Security: Strategies for securing cloud-based infrastructure and applications, including cloud security architecture, identity and access management in the cloud, and data protection in the cloud.
⢠Cyber Threat Intelligence: Techniques and tools for collecting, analyzing, and acting on intelligence about cyber threats, including threat intelligence platforms, open-source intelligence (OSINT), and cyber threat hunting.
⢠Ethical Hacking and Penetration Testing: Methodologies and tools for identifying vulnerabilities in systems and applications through ethical hacking and penetration testing, including OWASP Top 10, Metasploit
ę˛˝ë Ľ 경ëĄ