Review.io
  • user_iconLOGIN
  • cart_icon

    No products in the basket.

Computer Networking and Cyber Security

CPDUK Accredited | 50% OFF Certificate & Transcript

34 Students enrolled on this course 4.7 (6 Reviews)

clock Last updated August 30, 2023

Get Lifetime Access to 3000+ Courses for only £149! Find out more.

Register on the Computer Networking and Cyber Security today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career.

The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials.

Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion.

The Computer Networking and Cyber Security course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones.

The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly!

What You Get With The Computer Networking and Cyber Security course
  • Receive a e-certificate upon successful completion of the course
  • Get taught by experienced, professional instructors
  • Study at a time and pace that suits your learning style
  • Get instant feedback on assessments 
  • 24/7 help and advice via email or live chat
  • Get full tutor support on weekdays (Monday to Friday)

Course Design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Certification

After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post.

Who Is This Course For:

The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.

Requirements:

The online training is open to all students and has no formal entry requirements. To study the Computer Networking and Cyber Security course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.

Course Curriculum

Section 01: Introduction to Cyber Security Masterclass Course
Course Introduction 00:04:00
Section 02: Complete Computer Networking for Cybersecurity and Ethical Hacking
What is a Network? 00:04:00
What is a Local Area Network? 00:03:00
Routers and LAN 00:03:00
Network Components 00:07:00
WAN and MPLS 00:06:00
Peer to Peer Network Architecture 00:04:00
Client-Server Network Architecture 00:04:00
Bus and Star Topology 00:06:00
Mesh and Ring Topology 00:05:00
Other Network Topologies that you should know! 00:08:00
Quick Recap 00:03:00
Introduction to Internetworking Models 00:03:00
Layered Approach and Advantages 00:05:00
Introduction to OSI Model 00:06:00
OSI Model: Application Layer 00:04:00
OSI Model: Presentation and Session Layer 00:02:00
OSI Model: Transport Layer 00:02:00
Connection Oriented vs Connectionless Service 00:06:00
What is Flow Control? 00:05:00
What is Windowing? 00:04:00
OSI Model: The Physical Layer 00:04:00
Quick Recap 00:04:00
What’s next? 00:02:00
What is a Coaxial Cable? 00:06:00
What is a Twisted Pair Cable? 00:03:00
What is Fibre Optic Cable? 00:06:00
Media Converters 00:05:00
UTP Categories 00:07:00
Different Wiring Standards 00:05:00
Straight Through Cable Type 00:05:00
Quick Recap 00:03:00
Welcome to Ethernet Specifications 00:02:00
Ethernet Basics 00:04:00
CSMA – CD Contention Method 00:04:00
Broadband – Baseband 00:04:00
Binary – Decimal Conversion 00:06:00
Ethernet Addressing 00:03:00
What are Ethernet Frames? 00:04:00
Ethernet at Physical Layer 00:02:00
IEEE 802.3 00:03:00
Quick Recap 00:01:00
Section 03: Networking Devices
Common Networking Devices 00:03:00
Network Interface Card (NIC) 00:02:00
Hub 00:04:00
Bridge 00:02:00
Switch 00:05:00
Router 00:05:00
Firewalls 00:05:00
IDS IPS HIDS 00:05:00
Access Points 00:03:00
Wireless Range Extenders 00:02:00
CSMA CA Introduction 00:04:00
CSMA CA Working 00:04:00
CSMA CD Introduction 00:02:00
CSMA CD Working 00:03:00
Introduction to DHCP Server 00:04:00
DHCP Operations 00:05:00
Introduction to Other devices 00:01:00
Multilayer Switch and Load Balancer 00:04:00
Introduction to DNS Server 00:05:00
DNS Record types 00:07:00
Types of DNS Servers 00:03:00
Proxy Servers 00:05:00
Encryption Devices 00:03:00
Analog Modems, Packet Shaper and VPN Concentrator 00:04:00
Media Converters and Next Generation Firewalls 00:02:00
Benefits of Routers 00:02:00
Quick Recap 00:04:00
Section 04: Getting Started with Cybersecurity!
What is Security? 00:06:00
What is Cybersecurity? 00:05:00
History of Cybersecurity 00:07:00
How to start a career in Cybersecurity? 00:06:00
Different Careers in Cybersecurity 00:10:00
Key Terms in Cyber Security 00:06:00
Elements of Information Security 00:07:00
Section 05: Fundamentals of Cybersecurity
Types of Actors 00:09:00
Passive Attacks in Cybersecurity 00:05:00
Active Attacks in Cybersecurity 00:05:00
Security Organizations 00:05:00
Section 06: Key Security Concepts
Security Architect’s View of Cybersecurity 00:06:00
Security Services and Mechanisms 00:06:00
Security Attacks! 00:07:00
Section 07: Cryptography - Securing your Data
What is Cryptography? 00:05:00
What is Symmetric Encryption? 00:03:00
AES and DES Standards in Cryptography 00:06:00
Asymmetric Encryption 00:03:00
Hashing 00:07:00
PKI and CA 00:10:00
RSA and Diffie Hellman Algorithms 00:07:00
What are Digital Signatures? 00:09:00
Transport Layer Security (TLS) Encryption 00:04:00
Generating Hashes using HashCal 00:04:00
Understanding Encryption and Decryption 00:05:00
Section 08: Introduction to Ethical Hacking
Hacking Terms 00:07:00
Vulnerability Assessment and Penetration Testing 00:09:00
Pentesting Methodologies 00:07:00
Types of Penetration Tests 00:06:00
Phases of Penetration Testing 00:04:00
10 Steps SECURITY EXPERTS follow! 00:04:00
Section 09: Setting up your own Penetration Testing Lab
What is Linux Operating System? 00:04:00
Have you heard of Kali Linux? 00:03:00
Installing Virtual Box 00:06:00
Installing KALI Linux in Virtual Box 00:12:00
Installing Metasploitable Machine in Virtual Box 00:09:00
Installing Damn Vulnerable Web Application (DVWA) in KALI Linux 00:18:00
Installing TOR Browser 00:09:00
Executing Linux Commands – Part 1 00:12:00
Executing Linux Commands – Part 2 00:14:00
Section 10: Information Gathering - Reconnaissance
What is Information Gathering? 00:08:00
Information Gathering using MALTEGO – Part 1 00:07:00
Information Gathering using MALTEGO – Part 2 00:06:00
Information Gathering using HTTRACK 00:05:00
Information Gathering using THE HARVESTER 00:02:00
Information Gathering using OSINT Framework 00:05:00
Information Gathering using NSLOOKUP 00:03:00
Information Gathering using REDHAWK 00:05:00
Information Gathering using SHODAN 00:09:00
Section 11: Scanning and Enumeration
What is Scanning? 00:07:00
What is NMAP Tool? 00:05:00
How to use Zenmap GUI? 00:17:00
What is Enumeration? 00:03:00
Types of Enumeration 00:03:00
Enumeration using Super Scan Tool 00:07:00
Enumeration Using Hyena Tool 00:06:00
Section 12: Vulnerability Assessment and Penetration Testing
What is Vulnerability Assessment? 00:04:00
Phases of Vulnerability Assessment 00:08:00
What are Vulnerability Scoring Systems? 00:09:00
Introduction to Nessus Tool 00:05:00
Create and Configure Network Scan using Nessus 00:08:00
Launching a Scan in Nessus Tool 00:08:00
What is an Intrusion Detection System? 00:11:00
Section 13: Firewall
What is a Firewall? 00:10:00
What is a Demilitarized Zone (DMZ)? 00:06:00
How to evade Intrusion Detection System? 00:08:00
How to evade Firewall? 00:09:00
Firewall Pentesting 00:02:00
Section 14: Web Application Penetration Testing
Introduction to Web Servers 00:05:00
Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
How to protect web servers from getting hacked? 00:05:00
OWASP Top 10 Vulnerabilities – Part 1 00:05:00
OWASP Top 10 Vulnerabilities – Part 2 00:07:00
Website Footprinting – Part 1 00:05:00
Website Footprinting – Part 2 00:03:00
Exploiting Basic Command Execution Vulnerability 00:06:00
Exploiting Basic Command Execution Vulnerability 00:06:00
How to configure Burp Suite? 00:16:00
Exploiting Basic File Upload Vulnerability 00:10:00
Exploiting Advance File Upload Vulnerability 00:07:00
Exploiting more advance File Upload Vulnerability 00:08:00
What is SQL Injection? 00:04:00
Types of SQL Injections 00:05:00
How to exploit SQL Injection manually? 00:17:00
Automating SQL Injection using SQLMap 00:09:00
How to prevent SQL Injection? 00:03:00
What is Cross Site Scripting (XSS) Vulnerability? 00:03:00
Types of Cross Site Scripting Vulnerability 00:06:00
Exploiting XSS vulnerability – Part 1 00:11:00
Exploiting XSS vulnerability – Part 2 00:05:00
Exploiting XSS vulnerability – Part 3 00:11:00
How to prevent XSS Attacks? 00:04:00
What is Cross Site Request Forgery (CSRF)? 00:06:00
Exploiting Cross Site Request Forgery Vulnerability 00:07:00
What is a Brute Force Attack? 00:05:00
Getting Usernames and Passwords using Brute Forcing 00:18:00
How to carry out a complete Web Application Penetration Test? 00:09:00
How to protect Web Applications? 00:06:00
Section 15: Denial of Service
What is Denial of Service? 00:03:00
Types of DOS Attacks? 00:05:00
What is a Botnet? 00:03:00
Section 16: Malware Threats
What is a Malware? 00:09:00
What are Trojans? 00:08:00
Types of Trojans 00:08:00
Introduction to Virus 00:07:00
Types of Virus 00:10:00
How to prevent against Malware? 00:07:00
Section 17: Social Engineering - The Art of Human Exploitation
What is Social Engineering? 00:05:00
Types of Social Engineering Techniques 00:06:00
Getting user credentials using BEEF – Part 1 00:09:00
Getting user credentials using BEEF – Part 2 00:11:00
Section 18: Writing a Penetration Testing Report
What is a Pentest Report? 00:08:00
Components of a Penetration Test Report 00:14:00

Course Reviews

4.7

4.7
6 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

£25

92% OFF

moneyback 14-Day Money-Back Guarantee
  • Level
  • Certificate Yes
  • Units 183
  • Quizzes 0
  • Duration 17 hours, 52 minutes
  • cpd uk
  • Tutor support

    Tutor Support

  • fully online

    Fully Online

Frequently asked questions

Can’t find the anwser you’re looking for ? Reach out to customer support team.

Are there any prerequisites for taking the course?

There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.

Can I access the course at any time, or is there a set schedule?

You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.

How long will I have access to the course?

For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.

Is there a certificate of completion provided after completing the course?

Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.

Can I switch courses or get a refund if I'm not satisfied with the course?

We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.

How do I track my progress in the course?

Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.

What if I have technical issues or difficulties with the course?

If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Home Search Cart Your Offers