“The Complete Cyber Security Starter Course” is designed for those of you who want to dive into the Cyber Security industry, but are not sure what is involved, what they should focus on first and in depth information on every single aspect of the industry. This course mimics what is taught in a cyber security degree but with extra information and study guides included. Below is a list of each of the levels with what topic is covered separated over those 3 levels.
Course Outline:
📒 Exploring IT
- Current Trends in Technology
- Developing a Professional Identity
- Basic Web Development
📒 Thinking Technology and Design
- Real World Practices for Cyber Security
- Communication Network Risk Management
- Understanding Threats & Vulnerabilities
- Detecting Cyber Attacks
📒 Real World Practices for Cyber Security
- Critical Thinking Exercises
📒 Career Tools for Employability
- Resume Building
- Identifying your Identity
📒 Data and Information Management
- Database Systems
- Design
- Implementation
- Management
- Data Modelling
📒 Introduction to Programming
- Software
- Low-Level Programming Languages
- Machine Code
- Assembly Language
- High-Level Languages
- Procedual Languages
- Object Orientated Languages
- Integrated Development Environments
- Approaching Program Development
- Problem Example
- Outline of Problem
- Solving the Problem
📒 Professional Practice in Information Technology
- Professional Skills
- Professionalism
- The Impact of Technology in Society
- The Modern IT Workplace
📒 Discrete Mathematics
- Mathematical Reasoning
- Discrete Mathematical Examples
- Cryptography
- Networks
- Computer Programming
- Algorithm Analysis
📒 Cyber Security Analytics
- Problem Investigation Methodologies
- Scripting Techniques
- Cyber Security Data Analytics
📒 Networks and Communications
- Computer Networks
- Types of Networks
- Communication Protocols
- Network Security Issues
📒 Cryptography
- Classic & Modern Cryptographic Systems
- Decryption and Encryption
📒 Cyber Security Management
- Cyberspace Safety & Security
- Corporate Security Management
- Operational Constraints
- Contingency Planning
- Risk Assessment
- Risk Management
- Compliance Standards
📒 Computer Crime and Digital Forensics
- Crime Manifestation in the IT World
- Cyber Crime Laws
- Digital Forensic Techniques
- Acquisition
- Verification
- Extraction
- Reconstruction
- Reporting
📒 Cyber Security Project Management
- Project Management Methodologies & Practices
📒 Ethical Hacking
- Ethical Hacking Techniques
📒 Governance, Risk & Compliance
- What is GRC
- GRC Done Right
- GRC Done Wrong
📒 Report Writing
- What Makes a Good Report
- Security Audit Report Example
- Bug Bounty Triage Report Example
📒 Systems Security
- OS Security
- Database Security
- Server Security
- Network Security
- Cyber Security Safety Principles
- Defensive Security Tactics
Over 30 Hours of Content!