Current Status
Not Enrolled
Price
500
Get Started
Sign-up now
Start Course
Course Content
Expand All
Welcome to Cyber Security
3 Topics
Sample Chapter
Expand
Chapter Content
0% Complete
0/3 Steps
Importance of Cyber Security
Case Study
Course Learning Outcomes
Introduction to Cyber Security
4 Topics
|
1 Quiz
Sample Chapter
Expand
Chapter Content
0% Complete
0/4 Steps
What is Cyber Security?
People are the weakest link
Performing A Risk Assessment
QUIZ: Introduction to Cyber Security
Cyber Security Introduction
Hardware Assets
5 Topics
Expand
Chapter Content
0% Complete
0/5 Steps
What are Hardware Assets
Cyber Physical Attack
Protecting Hardware Assets
EXERCISE: Hardware Risk Matrix
TASK: Risk Matrix for Hardware Assets
Cloud & Software Assets
5 Topics
|
1 Quiz
Expand
Chapter Content
0% Complete
0/5 Steps
Identify Cloud & Software Assets
Protecting Cloud & Software Assets from Threats
EXERCISE: HACK ATTACK
TASK: Risk Matrix of Cloud & Software Assets
QUIZ
Cloud & Software Assets
Data Assets
6 Topics
Expand
Chapter Content
0% Complete
0/6 Steps
What are Data Assets?
Protecting Data Against Threats
Data Protection Policy
Data Classification
EXERCISE: Risk Matrix of Data Assets
TASK: Risk Matrix of Data Assets
Email And Communication
5 Topics
|
1 Quiz
Expand
Chapter Content
0% Complete
0/5 Steps
Communication in Businesses
Threats Facing Email & Communication
EXERCISE: Risk Matrix of Communication Assets
Phishing
QUIZ
Email & Communication Quiz
Employee Risk Matrix
4 Topics
Expand
Chapter Content
0% Complete
0/4 Steps
The Relationship Between Employees and IT
Common Threats Employees Face
EXERCISE: Risk Matrix of Employees
TASK: Assess the Current Employees
FINAL TASK: submission
Conclusion
Login
Accessing this course requires a login. Please enter your credentials below!
Username or Email Address
Password
Remember Me
Lost Your Password?