Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,169,793 members, 7,875,968 topics. Date: Sunday, 30 June 2024 at 05:52 AM

Explore The World Of Cyber Security And Develop The Skills Needed To Stay Safe - Education - Nairaland

Nairaland Forum / Nairaland / General / Education / Explore The World Of Cyber Security And Develop The Skills Needed To Stay Safe (200 Views)

Strike: We Will Explore Other Options If ASUU Remains Adamant - Ngige / 2019 UTME: JAMB Stops Use Of Cyber Cafes For Registration Of Candidates / Egyptian Archaeologist Discovered 3500 Years Old Mummy As They Explore Tombs(PIC (2) (3) (4)

(1) (Reply)

Explore The World Of Cyber Security And Develop The Skills Needed To Stay Safe by DomineIctHubs: 4:19pm On Aug 18, 2021
DOMINE ICT ACADEMY

Yy5 Abuja Road By Lagos Street R/About, Kaduna.
Email: domineicthubs@gmail.com
Tel: 08036949015, 07045598289; 08068765146


Modern life depends on online services, so having a better understanding of cyber security threats is vital.
On this course, you’ll learn how to recognize online security threats that could harm you and explore the steps you can take to minimize your risk.
The course will improve your online safety in the context of the wider world, introducing concepts like malware, trojan virus, network security, cryptography, identity theft, and risk management.


Threat landscape

Online, the new frontline
Meet your course guide, and start to explore the security threat landscape. Learn basic techniques for protecting your computers and your online information.

Understanding current threats
Learn about different kinds of threat, the vulnerabilities that they exploit and some countermeasures that can be put in place to guard against them.

Securing my digital information
Most of us rely on the internet for everyday tasks such as shopping, working, banking and social networking but don't stop to think about the security issues that might be involved.


Authentication

Who do they think you are?
Many security threats depend on the attackers being able to impersonate us online. Passwords are the main way we authenticate ourselves to the services we use, therefore you’ll learn ways of improving the security of passwords.

Improving password security
Just about every website you sign up to requires a password. What strategies do you use when choosing passwords?

It's not just what you know
Two-factor authentication can also help with your security. How does it work and how do you implement it on your accounts?


Malware

Malware basics
Find out about different types of malware, how they developed and what damage they can do. Discover some of the terms used to describe malware.

How malware gets into your computer
Learn about malware, phishing and click fraud. Confess to your bad habits and make a plan to change.

Keeping malware at bay
How do can you protect yourself from malware? Learn about antivirus software, sandboxes and some tips on how to spot phishing emails.


Networking and communications

How does the internet work?
The internet is not a single entity; it is a hierarchy of individual networks connected to one another. Learn how information is moved through it.

Network security challenges
How secure is the internet? What can you do to keep your information secure?

Role of standards
For the internet to function, common standards apply to every network. Find out what these are and how they operate.


Cryptography

Cryptography basics
Cryptography is a specialized area of mathematics concerned with securing information so that it can be transmitted safely even when there is a risk it might be intercepted.

Putting cryptography to use
Examine how cryptographic techniques can be used in practice, install encryption software and send an encrypted email.

Cryptography in the wild
There are hundreds of different cryptographic schemes, learn about some of the ways they are used.


Network security

Protecting your data on the network
How can you protect your communication networks from attack? Learn how a firewall can help.

Keeping your secrets on the network
How does Virtual Private Networking work? What is it used for? When would you use one? How secure are they?

Detecting attacks
You’ve probably seen a movie or TV programme featuring an attack on a computer network. The administrators rush to their keyboards and frantically begin typing – it’s all very exciting – but does this happen in real life?


When your defences fail

What’s the worst that could happen?
What do you do when things go wrong? Learn about the laws that protect you and your data, such as the Data Protection Act and the Computing Act, in the UK.

Cyber security and the law
Look at some of the laws in the UK, such as the Data Protection Act 2018 and the Computer Misuse Act 1990, which help to protect us against information security threats.

Putting things right
Learn how to recover from an attack on your information security and what you can do to prevent a similar attack being successful in the future.


Managing security risks

Analyzing security risks
Identify and analyse the risks to your own information assets. What information is most valuable? To whom?

Managing the risks
Learn what measures you can take to manage the risks to your information assets and to ensure that you stay safe online.
Taking stock
Take stock of what you've learned and how it will affect your security measures and web practices. Take the end of course assessment and find out about the next steps.


What will you achieve?

By the end of the course, you‘ll be able to...

*Explain basic cyber security terminology; have skills for keeping up to date on cyber security issues; and be able to identify information assets.

*Describe basic authentication mechanisms; have skills to improve their password security; and be aware of alternative authentication methods.

*Identify main malware types; awareness of different malware propagation methods; and skills for preventing malware infections.

*Describe cryptography terminology; be able to use cryptography for email; be aware of applications of cryptography.

*Demonstrate understanding of firewalls, virtual private networks and network intrusion detection and prevention technologies.

*Describe legal and regulatory issues relating to cyber security; and understand how to recover from security failures.

*Apply basic risk analysis and management techniques.

Who is the course for?
The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information, whether at home or at work.

(1) (Reply)

Uphold Login – Login Your Uphold Account / Ican Study/tutorial Center In Minna / Quantitative Reasoning

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 19
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.