
Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.
Non-Linear: Random Order
Course overview
In today’s cyber world, it is important for engineers to understand and appreciate computer/information security as it has become an essential aspect of our daily life. 
Course description
This course provides students with concepts of computer security,Threats & Prevention Methods, Data Security Consideration, Frameworks & Cybersecurity Technology, Cybersecurity Attacks -Types of Cyber Attackers, Policies & Standards Learning Outcomes Upon the completion of this course, students should be able to understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
                                                                                            
                                        1.1 Introduction & History
                                                    
                                                    
                                                
                                                                                            
                                        1.2 The Evolution of Cybersecurity
                                                    
                                                    
                                                
                                                                                            
                                        1.3 Importance of Cyber Security
                                                    
                                                    
                                                
                                                                                            
                                        1.4 Scope of Cyber Security
                                                    
                                                    
                                                
                                                                                            
                                        Introduction - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Cyber Security Introduction
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        2.1 Cyber Security vs Information Security
                                                    
                                                    
                                                
                                                                                            
                                        2.2 Overview of Information Security
                                                    
                                                    
                                                
                                                                                            
                                        2.3 Similarities Between Cyber Security and Information Security
                                                    
                                                    
                                                
                                                                                            
                                        Cyber Security vs Information Security - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Ref Cyber Security vs Information security
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        3.1 Relationship Between Threats and Prevention Methods
                                                    
                                                    
                                                
                                                                                            
                                        3.2 Types of Threats
                                                    
                                                    
                                                
                                                                                            
                                        3.3 Types of Prevention Methods
                                                    
                                                    
                                                
                                                                                            
                                        3.4 Implementing Prevention Methods
                                                    
                                                    
                                                
                                                                                            
                                        Threats And Prevention Methods - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Cyber Security Threats and Prevention
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        4.1 Framework & Technology
                                                    
                                                    
                                                
                                                                                            
                                        4.2 Types of Cybersecurity Frameworks
                                                    
                                                    
                                                
                                                                                            
                                        4.3 Types of Cybersecurity Technologies
                                                    
                                                    
                                                
                                                                                            
                                        4.4 Implementing Frameworks and Technologies
                                                    
                                                    
                                                
                                                                                            
                                        Frameworks - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Cyber security Frameworks
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        5.1 Security Technologies
                                                    
                                                    
                                                
                                                                                            
                                        5.2 Firewalls
                                                    
                                                    
                                                
                                                                                            
                                        5.3 Intrusion Detection Systems (IDS)
                                                    
                                                    
                                                
                                                                                            
                                        5.4 Antivirus Software
                                                    
                                                    
                                                
                                                                                            
                                        5.5 Encryption
                                                    
                                                    
                                                
                                                                                            
                                        Security Technologies - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Firewalls and Intrusion Detection
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        6.1 Types of Cyber Attacks and Its Preventive Measures
                                                    
                                                    
                                                
                                                                                            
                                        6.2 Cyber Attacks Protection
                                                    
                                                    
                                                
                                                                                            
                                        6.3 Consequences of a Cyber Attack
                                                    
                                                    
                                                
                                                                                            
                                        6.4 The Laws and Regulations That Govern Cyber Security
                                                    
                                                    
                                                
                                                                                            
                                        6.5 Think Like A Hacker
                                                    
                                                    
                                                
                                                                                            
                                        Cyber security - Attacks - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Cyber Security Attackes
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        7.1 Policies
                                                    
                                                    
                                                
                                                                                            
                                        7.2 Importance of Having a Cyber Security Policy
                                                    
                                                    
                                                
                                                                                            
                                        7.3 Responsibilities of Employees & Management
                                                    
                                                    
                                                
                                                                                            
                                        Cybersecurity Policies - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Ref: Cybersecurity Policies
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        8.1 Security Standards
                                                    
                                                    
                                                
                                                                                            
                                        8.2 Careers in Cyber Security and Types of Cyber Security Jobs
                                                    
                                                    
                                                
                                                                                            
                                        8.3 Skills Required for Cyber Security Jobs
                                                    
                                                    
                                                
                                                                                            
                                        8.4 How to Get a Job in Cyber Security
                                                    
                                                    
                                                
                                                                                            
                                        Cyber Security Standards - Assessment
                                                                                5 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                        
                                        Ref: Privacy regulation in Europe
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Final Assessment
                                                                                20 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                The certificate issued for the Course will have
Only the e-certificate will be made available. No Hard copies. The certificates issued by uLektz Academy . can be e-verifiable at www.ulektzskills.com/verify.
 
	   
                          
                
                                         
                
                
50 hours Learning Content
100% online Courses
English Language
Certifications