Global Certificate in Cyber Security: Protecting Your Assets
-- viewing nowThe Global Certificate in Cyber Security: Protecting Your Assets course is crucial in today's digitally connected world. With the increasing number of cyber threats, there's a growing demand for cyber security professionals who can protect digital assets and infrastructure.
6,321+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
About this course
100% online
Learn from anywhere
Shareable certificate
Add to your LinkedIn profile
2 months to complete
at 2-3 hours a week
Start anytime
No waiting period
Course Details
• Fundamentals of Cyber Security: This unit covers the basics of cyber security, including common threats and attacks, security principles, and best practices.
• Network Security: This unit focuses on protecting networks from unauthorized access, data breaches, and other cyber threats. Topics include firewalls, VPNs, and intrusion detection systems.
• Endpoint Security: This unit covers the protection of individual devices, such as laptops, smartphones, and tablets, from cyber threats. Topics include antivirus software, patch management, and device encryption.
• Identity and Access Management: This unit covers the management of user identities and access to systems and data. Topics include authentication, authorization, and account provisioning.
• Incident Response and Disaster Recovery: This unit covers the process of responding to and recovering from cyber security incidents. Topics include incident detection, response planning, and disaster recovery planning.
• Data Security: This unit focuses on protecting data from unauthorized access, theft, and loss. Topics include data encryption, backup and recovery, and data loss prevention.
• Cloud Security: This unit covers the security of cloud-based systems and services. Topics include cloud security architecture, data privacy, and compliance.
• Cyber Security Law and Regulations: This unit covers the legal and regulatory aspects of cyber security. Topics include data protection laws, industry standards, and compliance requirements.
• Ethical Hacking and Penetration Testing: This unit covers ethical hacking and penetration testing techniques for identifying vulnerabilities in systems and applications. Topics include reconnaissance, scanning, exploitation, and reporting.
• Security Operations and Monitoring: This unit covers the ongoing monitoring and management of cyber security systems and processes. Topics include security information and event management (SIEM), threat intelligence, and security automation and orchestration.
• Priv
Career Path
Entry Requirements
- Basic understanding of the subject matter
- Proficiency in English language
- Computer and internet access
- Basic computer skills
- Dedication to complete the course
No prior formal qualifications required. Course designed for accessibility.
Course Status
This course provides practical knowledge and skills for professional development. It is:
- Not accredited by a recognized body
- Not regulated by an authorized institution
- Complementary to formal qualifications
You'll receive a certificate of completion upon successfully finishing the course.
Why people choose us for their career
Loading reviews...
Frequently Asked Questions
Course fee
- 3-4 hours per week
- Early certificate delivery
- Open enrollment - start anytime
- 2-3 hours per week
- Regular certificate delivery
- Open enrollment - start anytime
- Full course access
- Digital certificate
- Course materials
Get course information
Earn a career certificate