Core Courses
CyberSecurity 101
As organisations become more and more dependent on IT systems to store data, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging. In this course, you’ll explore information security concepts and the security-related roles within an organisation. You’ll
also learn about security governance and the activities involved in it. You’ll explore the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various controls that can be implemented to mitigate risks. You’ll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cyber security, as well as the various types of malware and security threats. You’ll also learn effective methods to reduce common security risks that render organisations vulnerable.
CyberSecurity 102
Continuing with the foundational elements of security begun in the previous course, in this second course, you’ll explore different ways organisations protect their information and systems from malicious activity. You’ll start by learning best practices in intrusion prevention and move on to the fundamentals of penetration (pen) testing. From there, you’ll examine how organisations
manage and analyse the results of their pen-testing activities.
Getting Started with Information Security
Now that you’ve learned the core foundational elements of security, it’s time to start thinking like a security professional. In this course, you’ll learn about security topologies and the key role they play in network security. You’ll explore continuous infrastructure testing and security governance. You’ll delve further into pen testing, and you’ll learn how honeypots can help protect an organisation’s systems. You’ll also learn about APT defences, network access control, subnetting, and DNS security. And you’ll
learn about securing network protocols.
Evaluating and Planning for Security Risks
As you might expect, effective security risk management often begins with proper security risk identification. In the course, you’ll examine various components of the risk identification process and different techniques used to identify risk. You’ll explore the assessment, classification, and prioritisation of security risks. And you’ll identify the activities involved in the risk management process, the importance of risk strategies in the context of work environments, and essential decisions required for managing security risks effectively.
Cloud Security Fundamentals
This course provides an introduction to cloud security concepts and is ideal for anyone who wishes to learn the core principles of cloud infrastructure, data, and application security. You’ll begin the course by exploring cloud definitions, roles, deployment models, characteristics, and building block technologies. You’ll then move on to the fundamentals of cloud architecture and design. From there, you’ll learn about securing cloud data-at-rest and data-in-transit by using various security controls offered by the cloud service provider. And you’ll learn how to secure applications in the cloud. Lastly, you’ll explore the critical and often overlooked approaches to legal and regulatory compliance when working with cloud solution providers.
Security+
In this course, we’ll cover the essential knowledge and skills relating to IT security, including attacks, threats and vulnerabilities, architecture and design, implementation, operations and incident response, and governance, risk, and compliance. Successful completion of the course will prepare you for the CompTIA certification exam. The Security+ certification is a powerful credential to have in today’s IT job market.
Elective Courses (choose two)
• Communication Skills for IT Specialists
• Cloud Essentials+
• AWS Cloud Practitioner
• Azure Fundamentals
• Mitigating Security Risks
• Cloud Security Administration
• CyberSecurity Analyst (CySa+)
For details regarding professional exam certification, please speak with one of our Course Advisors.