About Course

This module provides skills required for first line of security support. 1 Goal Analytics has collaborated with industry to create a program that trains candidates specifically for the roles such as Cyber Security Analyst, Information Security Manager, Cyber Security architect, Network Security Engineer, IT Security Consultant, Cryptologist, and Data Privacy Officer.

In this module you will learn how to contribute to the delivery of a security culture across an organisation, understanding vulnerability and threats and supporting the development of an organisation’s cybersecurity maturity. This requires individual to monitor and detect potential security threats and escalate as necessary and to support secure uninterrupted business operations of an organisation through the implementation of cyber security mechanism and application of cyber security procedures and controls.

You will also learn how to apply procedures and controls to maintain security and control of an organisation, and process security requests ensuring confidentiality, integrity and availability of information stored digitally. The specific cyber security mechanism and controls that you would be required to implement would include: patching, software, installing software updates, implementing access control, configuring firewalls, security incident and event management tools.

 

Program Features:
  • 3 – Months Online Program
  • Live Online Sessions
  • Capstone Projects
  • Online Lab Sessions
On completing this program:

You will also develop the following soft skills:

  • Strategic decision-making for assessing and managing cyber roles
  • Strong communication for conveying complex security concepts in understandable terms
  • Adaptability to the rapid transformation in the cyber security landscape
  • Ethical and responsible handling of sensitive data
Show More

What Will You Learn?

  • Develop the expertise to protect the public and organisations from cyber threats
  • Boost your career prospects by learning to navigate the intricacies of data protection laws, cryptology, IT security and network forensics
  • Fit learning around your life, wherever you are in the world - choose from full or part-time study and start any day you choose.
  • Start studying today via our innovative online learning platform with everything you need to hand - from digital learning resources to personal and academic support.

Course Content

Cyber Security and Networking

  • Introduction Cybersecurity
    36:07
  • Introduction to Ethical Hacking
    30:15

Cryptography

Web Application and Cloud Security

Compliance and Regulatory Standard (ISO27001, PCD-DSS, NIST), Data Privacy

Firewall, IDS & IPPS

Linux; Python, SQL, C++

Security Training and Malware Analysis

Cybersecurity Leadership and Governance

Compliance Audit and Security

Vulnerability Management and Penetrating Testing

Forensic and Security Policies

Student Ratings & Reviews

No Review Yet
No Review Yet