• LOGIN
  • No products in the basket.

Cybersecurity from Basic to Advanced

Master cybersecurity from basics to advanced levels with our comprehensive course. Learn essential concepts and practical strategies to protect digital assets effectively.

1 STUDENTS ENROLLED

Choose Your Plan

**Additional shipping charge will be added for international delivery outside UK
TAKE THIS COURSE

Learning Outcome

Sneak Peek

Course Overview

Our curriculum is meticulously crafted to transform beginners into skilled cybersecurity professionals. You’ll start with the fundamentals of computer networks, delving into the intricacies of the ISO/OSI model and the TCP/IP protocol suite. This foundational knowledge is crucial for understanding the complexities of network security.

As you progress, we’ll guide you through identifying and mitigating security risks. Learn about firewalls and honeypots, the first line of defense in network security. You’ll understand how these tools can be effectively implemented to protect networks from unauthorized access.

The course delves into intrusion detection and prevention systems (IDS/IPS), arming you with the knowledge to shield networks from emerging threats. We also cover wireless network security, exploring robust strategies to safeguard wireless communications against eavesdropping and hacking.

An essential part of cybersecurity is response and recovery. Our module on physical security measures and incident handling prepares you to respond effectively to security breaches, minimizing impact and preventing future incidents.

Course Description 

This course is an excellent learning opportunity for those who are passionate about the topic and who are interested in a successful career within the relevant industry. Professionals currently working in this field who wish to brush up on their knowledge and advance their careers may also enrol in this program.   

In the Cybersecurity from Basic to Advanced Course, you will find a number of engaging, in-depth modules that will provide you with comprehensive theoretical knowledge that will enable you to succeed in your career. As proof of your completion, you will receive a free e-certificate from Learndrive.

Using computers, tablets, smartphones, and other internet-enabled devices, you can access the course modules at your own pace. Invest in your professional development today and learn skills that will lead to your dream job. Become a career leader by taking this course online.

What Do You Get With The Cybersecurity from Basic to Advanced Course?

  • Premium Video Materials in bite-sized format for the most accessible learning experience
  • Free e-certificate after completing the course
  • Flexible study time and pace
  • Instructor-led Course

Course Design

Students can access the course using any internet-connected device through our online learning platform. You may study at your own pace since there are no formal deadlines or teaching schedules.

Certification

The learners who pass the course will receive a Learndrive Certificate as a badge of accomplishment. The e-certificate is free of charge. There is a small fee, however, if you want a hard copy of your certificate.

Who Is This Course For?

The course is right for you if you already work in this industry or want to make the transition. This Cybersecurity from Basic to Advanced Course is designed to enhance your expertise and improve your CV. 

Requirements

Students from all backgrounds are welcome to participate in the online training. There are no requirements for participation. The only prerequisite for studying this Cybersecurity from Basic to Advanced Course is an interest in learning and a good grasp of English, mathematics, and computer skills.

Course Instructor

Education

Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2006 – 2013.   

M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 – 2005.   

Researcher, IRISA Institute, Rennes I University, France, 2001 – 2002.   

Information Technology Diploma, Information Technology Institute ITI, Computer Networks Dept., 1998 – 1999.   

B. Sc., Communications and Electronics Dept., Faculty of Engineering, Cairo University, 1993 – 1998.   

Certificates

Lean Six Sigma Green Belt, SECC/ITIDA, April 2016.   

Dale Carnegie Certified Instructor, 2015   

GIAC Assessing Wireless Networks GAWN 617, SysAdmin, Audit, Network, Security SANS, 2010.   

GIAC Certified Firewall Analyst GCFW 502, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Certified Incident Handler GCIH 504, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Security Essentials GSEC 401, SysAdmin, Audit, Network, Security SANS, 2009.   

RITI Advanced Management Program RAMP, Regional Information Technology Institute RITI, 2008.   

Publications

“Enhanced TCP-Friendly Rate Control for Supporting Video Traffic over Internet”, Mohammad A. Talaat, Gamal M. Attiya, and Magdi A. Koutb, Canadian Journal of Electrical and Computer Engineering CJECE, vol. 36, no. 4, 2013.   

“ETFRC: Enhanced TFRC for Media Traffic over Internet”, International Journal of Computer Networks, IJCN, vol. 3, no. 3, pp. 167-177, August 2011.  

“ETFRC: Enhanced TFRC for Media Traffic”, International Journal of Computer Applications, IJCA, vol. 18, no. 6, pp. 1-8, March 2011.   

“PSNR Evaluation for Media Traffic over TFRC”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Networks & Communications IJCNC, vol. 1, no. 3, pp. 71-76, October 2009.   

“A Survey on Unicast Congestion Control Protocols for Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Science and Network Security IJCSNS, vol. 9, no. 3, pp. 254-261, March 2009.   

“Congestion Control for Internet Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, World Academy of Science, Engineering, and Technology WASET Proceedings, vol. 44, pp. 208-212, Venice, Italy, August 2008.   

“Content-Aware Adaptive Video Streaming System”, Mohammad A. Talaat, Magdi A. Koutb, Hamdy M. Kelash, and Reda H. Aboelez. Published in the proceedings of the following conferences:   

Information and Communications Technologies ICT 2005, Cape Town, South Africa, May 2005.   

International Conference on Information and Communications Technologies ICICT 2005, Cairo, Egypt, Dec. 2005.

Accreditation

This course is accredited by CPDQE. The demand for professionals to engage in Continuing Professional Development is escalating, irrespective of the industry, career stage, or job function. CPD serves as an impactful mechanism for skill enhancement, maintaining the relevance of academic credentials, and strategically advancing one’s career. 

This CPDQE Certified Course will ensure that you have obtained the required CPD trainings for your professional development.

Demo Certificate

Course Curriculum

Introduction to Computer Networks
What is a Computer Newtwork? 00:11:00
Computer Networks Topologies 00:12:00
Computer Networks Categories 00:10:00
Computer Networks Devices and Services 00:11:00
Computer Networks Transmission Media 00:10:00
ISO/OSI Model (7 Layers)
Why ISO/OSI Model? 00:10:00
Application, Presentation, and Session Layers 00:12:00
Transport and Network Layers 00:11:00
Data Link and Physical Layers 00:09:00
ISO/OSI Model in Action 00:10:00
TCP/IP Protocol Suite
Introduction to Computer Networks Protocols 00:11:00
IP Protocol 00:13:00
TCP and UDP Protocols 00:13:00
Application Protocols 00:12:00
TCP/IP Characteristics and Tools 00:11:00
Wireless Networks
Wireless Networks Benefits 00:10:00
Wireless Networks Types 00:13:00
Wireless Networks Protocol (Wi-Fi) 00:07:00
Wireless Networks Devices 00:11:00
Wireless Networks Drawbacks 00:10:00
Computer Networks Security
Security Goals 00:09:00
Securing the Network Design 00:11:00
TCP/IP Security and Tools 00:12:00
Port Scanning and Tools 00:12:00
Sniffing and Tools 00:11:00
Firewalls and Honeypots
Why Using a Firewall? 00:13:00
Firewalls Rules 00:11:00
Firewalls Filtering 00:09:00
Honeypots 00:07:00
Bypassing Firewalls 00:08:00
Intrusion Detection and Prevention Systems (IDS/IPS)
What is Intrusion Detection Systems (IDS)? 00:12:00
Network IDS (NIDS) 00:07:00
NIDS Challenges 00:09:00
Snort as NIDS 00:09:00
Intrusion Prevention Systems (IPS) 00:08:00
Wireless Networks Security
Wired Equivalent Privacy WEP Attacking 00:11:00
WPA and AES Protocols 00:09:00
Wireless Security Misconceptions 00:09:00
Wireless Attacks and Mitigation 00:10:00
Secure Network Design with Wireless 00:09:00
Physical Security and Incident Handling
Physical Security Objectives 00:11:00
Physical Threats and Mitigation 00:11:00
Defense in Depth (DiD) 00:08:00
What is an Incident? 00:06:00
Incident Handling 00:14:00
Computer Networks Security Conclusion
Confidentiality, Integrity, and Availability (CIA) 00:07:00
Assets, Threats, and Vulnerabilities 00:05:00
Risks and Network Intrusion 00:06:00
Common Attacks 00:09:00
Security Recommendations 00:07:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

Choose Your Plan

**Additional shipping charge will be added for international delivery outside UK
TAKE THIS COURSE