Use the Pearson Computer Security Fundamentals 4th Edition course and lab to gain hands-on expertise in the technologies and methodologies of computer security. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The IT security course and lab completely cover the Web security concepts and principles that help you improve your ability to prevent a network from threats. This Cybersecurity online course is for System Administrators who want to know more about information and IT security.

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Use the Pearson Computer Security Fundamentals 4th Edition course and lab to gain hands-on expertise in the technologies and methodologies of computer security. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The IT security course and lab completely cover the Web security concepts and principles that help you improve your ability to prevent a network from threats. This Cybersecurity online course is for System Administrators who want to know more about information and IT security.

1
  • Introduction to Computer Security

  • Introduction
    How Seriously Should You Take Threats to Network Security?
    Identifying Types of Threats
    Assessing the Likelihood of an Attack on Your Network
    Basic Security Terminology
    Concepts and Approaches
    How Do Legal Issues Impact Network Security?
    Online Security Resources
    Summary

2
  • Networks and the Internet

  • Introduction
    Network Basics
    How the Internet Works
    History of the Internet
    Basic Network Utilities
    Other Network Devices
    Advanced Network Communications Topics
    Summary

3
  • Cyber Stalking, Fraud, and Abuse

  • Introduction
    How Internet Fraud Works
    Identity Theft
    Cyber Stalking
    Protecting Yourself Against Cybercrime
    Summary

4
  • Denial of Service Attacks

  • Introduction
    DoS Attacks
    Illustrating an Attack
    Common Tools Used for DoS Attacks
    DoS Weaknesses
    Specific DoS Attacks
    Real-World Examples of DoS Attacks
    How to Defend Against DoS Attacks
    Summary

5
  • Malware

  • Introduction
    Viruses
    Trojan Horses
    The Buffer-Overflow Attack
    Spyware
    Other Forms of Malware
    Detecting and Eliminating Viruses and Spyware
    Summary

6
  • Techniques Used by Hackers

  • Introduction
    Basic Terminology
    The Reconnaissance Phase
    Actual Attacks
    Malware Creation
    Penetration Testing
    The Dark Web
    Summary

7
  • Industrial Espionage in Cyberspace

  • Introduction
    What Is Industrial Espionage?
    Information as an Asset
    Real-World Examples of Industrial Espionage
    How Does Espionage Occur?
    Protecting Against Industrial Espionage
    The Industrial Espionage Act
    Spear Phishing
    Summary

8
  • Encryption

  • Introduction
    Cryptography Basics
    History of Encryption
    Modern Cryptography Methods
    Public Key (Asymmetric) Encryption
    PGP
    Legitimate Versus Fraudulent Encryption Methods
    Digital Signatures
    Hashing
    MAC and HMAC
    Steganography
    Cryptanalysis
    Cryptography Used on the Internet
    Quantum Computing Cryptography
    Summary

9
  • Computer Security Technology

  • Introduction
    Virus Scanners
    Firewalls
    Antispyware
    IDSs
    Digital Certificates
    SSL/TLS
    Virtual Private Networks
    Wi-Fi Security
    Summary

10
  • Security Policies

  • Introduction
    What Is a Policy?
    Defining User Policies
    Defining System Administration Policies
    Defining Access Control
    Development Policies
    Standards, Guidelines, and Procedures
    Disaster Recovery
    Important Laws
    Summary

11
  • Network Scanning and Vulnerability Scanning

  • Introduction
    Basics of Assessing a System
    Securing Computer Systems
    Scanning Your Network
    Getting Professional Help
    Summary

12
  • Cyber Terrorism and Information Warfare

  • Introduction
    Actual Cases of Cyber Terrorism
    Weapons of Cyber Warfare
    Economic Attacks
    Military Operations Attacks
    General Attacks
    Supervisory Control and Data Acquisitions (SCADA)
    Information Warfare
    Actual Cases
    Future Trends
    Defense Against Cyber Terrorism
    Terrorist Recruiting and Communication
    TOR and the Dark Web
    Summary

13
  • Cyber Detective

  • Introduction
    General Searches
    Court Records and Criminal Checks
    Usenet
    Summary

14
  • Introduction to Forensics

  • Introduction
    General Guidelines
    Finding Evidence on the PC
    Finding Evidence in System Logs
    Getting Back Deleted Files
    Operating System Utilities
    The Windows Registry
    Mobile Forensics: Cell Phone Concepts
    The Need for Forensic Certification
    Expert Witnesses
    Additional Types of Forensics
    Summary

15
  • Cybersecurity Engineering

  • Introduction
    Defining Cybersecurity Engineering
    SecML
    Summary

Audience

Anyone wishing to explore this topic will benefit.

Language

English

Prerequisites

There are no rerequisites for this course.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...