Cyber Security & Incident Management

Cyber Security & Incident Management

Lessons covering every topic
Quizzes for every lesson
Awards, experience points & levels
Analytics for student tracking
Course Dashboard

Content Areas

Learning Aim A

Cyber threats, vulnerabilities & protection methods.

Learning Aim B

Use of networking architectures & principles for security.

Learning Aim C

Cyber security protection plan.

Learning Aim D

Cyber security documentation.

Learning Aim E

Forensic procedures.

Modules

Expand All
How internal & external threats occur and their impact level on an organisation.
3 Lessons | 3 Quizzes Sample Module
How Internal Threats Occur
How External Threats Occur
The Impact of Threats
The different ways computers and/or systems are exposed to different threats and the attack vectors used.
2 Lessons | 2 Quizzes
System Vulnerabilities 1
System Vulnerabilities 2
The current and relevant United Kingdom legislation or other international equivalents apply to different systems.
2 Lessons | 2 Quizzes
Legal Responsibilities 1
Legal Responsibilities 2
The use and effectiveness of physical security measures.
1 Lesson | 1 Quiz
Physical Security Methods
The use and effectiveness of software and hardware security measures.
4 Lessons | 4 Quizzes
Antivirus & Firewalls
User Authentication
Encryption
Further Security Measures
The application and features of different network topologies and architectures.
3 Lessons | 3 Quizzes
Types of Networks
Network Topologies & Architecture
Modern Trends & Interpreting Schematics
The hardware and software components used in computer networks.
2 Lessons | 2 Quizzes
Hardware Components
Storage & Software Components
The application and function of network infrastructure services and resources.
3 Lessons | 3 Quizzes
Network Transmission
Network Structure
Network Services
The tools and methods for assessing computer system vulnerabilities, including third-party reviews, and penetration testing.
1 Lesson | 1 Quiz
Assessing Vulnerabilities
Assessing risk severity using probability and impact level, applying a severity matrix and conducting regular risk assessments.
2 Lessons | 2 Quizzes
Assessing Risk Severity
Risk Assessment Approach
Create a cyber security plan detailing protection measures for the most severe risks.
2 Lessons | 2 Quizzes
Cyber Security Plan 1
Cyber Security Plan 2
The purpose and content of policies, and their effectiveness.
5 Lessons | 5 Quizzes
General IT Policies 1
General IT Policies 2
Incident Response Policy 1
Incident Response Policy 2
Disaster Recovery Policy
The purpose and implications and external service providers and their agreements.
1 Lesson | 1 Quiz
External Service Providers
The forensic collection of evidence following a security incident and its purpose.
2 Lessons | 2 Quizzes
Desktop Forensics
Network Forensics
Performing the systematic forensic analysis of a suspect system and make recommendations.
2 Lessons | 2 Quizzes
Forensic Analysis Requirements
Evaluating Findings