inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
مصاريف
GBP 125
تاريخ البدء
وسيلة الدراسة
داخل الحرم الجامعي
مدة
1 days
حقائق البرنامج
تفاصيل البرنامج
درجة
الدورات
تخصص رئيسي
Cybersecurity | Data Analysis | Network Security
التخصص
علوم الكمبيوتر وتكنولوجيا المعلومات
نوع التعليم
داخل الحرم الجامعي
توقيت
لغة الدورة
إنجليزي
مصاريف
متوسط ​​الرسوم الدراسية الدولية
GBP 125
دفعات
تاريخ بدء البرنامجآخر موعد للتسجيل
2025-04-25-
عن البرنامج

نظرة عامة على البرنامج


Introduction to Cybersecurity

Overview

Our Introduction to Cybersecurity masterclass will explore fundamental concepts and practical strategies that you can use to safeguard your digital life. The course is designed for individuals with little to no technical background, so you can expect clear explanations and hands-on exercises tailored to non-technical users. However, if you're familiar with cybersecurity, this short course will help to improve your knowledge.


Course Structure

This course has been designed as an introduction to cybersecurity aimed at those learners who have no prior knowledge of cybersecurity or its related domains. This course will give a grounding in the basics of what cybersecurity is and is not, and how you can protect yourself and your business from cyber threats.


Day One

  • Understanding Cybersecurity: We will start by discussing what cybersecurity is and why it matters. You'll learn about the different types of cyber threats and how they can impact your personal and professional life and business operations.
  • Recognising and Avoiding Threats: Through real-world examples and case studies, you'll become adept at identifying common cyber threats like phishing, malware, and ransomware. We'll teach you how to recognise suspicious activities and avoid falling victim to scams.
  • Protecting Your Personal Information: Learn practical steps to secure your personal data, including creating strong passwords, using multi-factor authentication, and practicing safe browsing habits.
  • Maintaining Device Security: Discover best practices for keeping your devices – such as computers, smartphones, and tablets – secure. This includes updating software, using antivirus programmes, and safeguarding against physical theft.
  • Cybersecurity in Everyday Life: We'll cover how to apply cybersecurity principles in various contexts, such as safe internet use, protecting your identity, and securing your home network. You'll also learn how to support family members in staying safe online.

Day Two

  • Network Security: Intrusion Detection and Prevention Systems (IDS/IPS): How these systems work to detect and prevent attacks. Network Segmentation: Strategies for dividing a network into segments to improve security.
  • Cryptography: We will look at Public Key Infrastructure (PKI), gaining a detailed look at how PKI supports secure communications and authentication. Digital Signatures and Certificates: How they ensure integrity and authenticity of data.
  • Application Security: We will look at Secure Software Development Lifecycle (SDLC): Integrating security practices into software development. Exploring topics such as Web Application Security and common vulnerabilities like Cross-Site Scripting (XSS) and SQL Injection in addition to Mobile Application Security, securing mobile apps and understanding platform-specific threats.
  • Cloud Security: Cloud Security Models: Understanding IaaS, PaaS, and SaaS security concerns.
  • Shared Responsibility Model: Defining the division of security responsibilities between cloud providers and customers. Securing Cloud Infrastructure: Best practices for securing cloud environments and data.
  • Emerging Technologies and Trends: Artificial Intelligence in Cyber Security: Using AI and machine learning to detect and respond to threats. Blockchain and Security: Understanding how blockchain can enhance security in various applications. Internet of Things (IoT) Security: Securing connected devices and addressing IoT-specific vulnerabilities.
  • Ethical Hacking and Penetration Testing: Ethical Hacking Techniques: Understanding the methodologies used by ethical hackers. Penetration Testing Tools: Introduction to tools like Metasploit, Nmap, and Burp Suite. Reporting and Mitigating Findings: Best practices for documenting and addressing security weaknesses.

Entry Requirements

We don’t currently display entry requirements for Ireland. Please contact the Student Admin team for more information.


Fees and Finance

The fee for this course is £125.


You may be eligible to receive this course fully funded through the UKSPF Sunderland Skills and Inclusion Programme. To be eligible for this funding you will need to be employed by a Sunderland-based company.


Related Courses

  • BSc (Hons) Cybersecurity and Digital Forensics
  • Digital Marketing
  • PgCert/PgDip Digital Marketing and Analytics
عرض المزيد
How can I help you today?