• LOGIN
  • No products in the basket.

Cybersecurity in 90 Minutes

Empower yourself with critical cybersecurity knowledge in just 90 minutes. From securing passwords to encryption, this course covers essential security measures for protecting digital and physical assets. Ideal for anyone keen on safeguarding their cyber presence.

7 STUDENTS ENROLLED

Choose Your Plan

**Additional shipping charge will be added for international delivery outside UK
TAKE THIS COURSE

Learning Outcome

Sneak Peek

Course Overview

In today’s digital age, understanding the basics of cybersecurity is not just beneficial; it’s essential. “Cybersecurity in 90 Minutes” is a focused, intensive course designed to provide you with a comprehensive overview of key cybersecurity concepts and practices.

The course begins with an introduction to the basics of cybersecurity, setting a solid foundation for the modules that follow. You will then delve into the world of “Securing Passwords,” learning the best practices for creating robust passwords and managing them effectively.

“Securing Operating Systems” and “Firewalls” modules equip you with the knowledge to protect your systems from unauthorized access and external threats. The course then guides you through the nuances of securing network devices like routers and switches, essential for maintaining a secure network infrastructure.

Wireless networks, often a vulnerable point in cybersecurity, are covered comprehensively. You will learn how to implement security measures to safeguard your wireless connections. The module on “IDS, IPS, and Honeypots” offers insight into advanced security systems and deception strategies to deter cyber attackers.

Antivirus software is a cornerstone of cybersecurity, and this course explains how to select and use these tools effectively. “Encryption” is another critical area, and you will understand how it protects data integrity and confidentiality.

Lastly, “Physical Security – Cybersecurity in 90 Minutes” ties all concepts together, emphasizing the importance of protecting physical devices and infrastructure as part of a comprehensive cybersecurity strategy.

This course is perfect for anyone looking to quickly but thoroughly understand the essentials of cybersecurity, whether for personal knowledge or professional development. Enroll now and take a significant step towards securing your digital life.

Course Description 

This course is an excellent learning opportunity for those who are passionate about the topic and who are interested in a successful career within the relevant industry. Professionals currently working in this field who wish to brush up on their knowledge and advance their careers may also enrol in this program.   

In the Cybersecurity in 90 Minutes Course, you will find a number of engaging, in-depth modules that will provide you with comprehensive theoretical knowledge that will enable you to succeed in your career. As proof of your completion, you will receive a free e-certificate from Learndrive.

Using computers, tablets, smartphones, and other internet-enabled devices, you can access the course modules at your own pace. Invest in your professional development today and learn skills that will lead to your dream job. Become a career leader by taking this course online.

What Do You Get With The Cybersecurity in 90 Minutes Course?

  • Premium Video Materials in bite-sized format for the most accessible learning experience
  • Free e-certificate after completing the course
  • Flexible study time and pace
  • Instructor-led Course

Course Design

Students can access the course using any internet-connected device through our online learning platform. You may study at your own pace since there are no formal deadlines or teaching schedules.

Certification

The learners who pass the course will receive a Learndrive Certificate as a badge of accomplishment. The e-certificate is free of charge. There is a small fee, however, if you want a hard copy of your certificate.

Who Is This Course For?

The course is right for you if you already work in this industry or want to make the transition. This Cybersecurity in 90 Minutes Course is designed to enhance your expertise and improve your CV. 

Requirements

Students from all backgrounds are welcome to participate in the online training. There are no requirements for participation. The only prerequisite for studying this Cybersecurity in 90 Minutes Course is an interest in learning and a good grasp of English, mathematics, and computer skills.

Course Instructor

Education

Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2006 – 2013.   

M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 – 2005.   

Researcher, IRISA Institute, Rennes I University, France, 2001 – 2002.   

Information Technology Diploma, Information Technology Institute ITI, Computer Networks Dept., 1998 – 1999.   

B. Sc., Communications and Electronics Dept., Faculty of Engineering, Cairo University, 1993 – 1998.   

Certificates

Lean Six Sigma Green Belt, SECC/ITIDA, April 2016.   

Dale Carnegie Certified Instructor, 2015   

GIAC Assessing Wireless Networks GAWN 617, SysAdmin, Audit, Network, Security SANS, 2010.   

GIAC Certified Firewall Analyst GCFW 502, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Certified Incident Handler GCIH 504, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Security Essentials GSEC 401, SysAdmin, Audit, Network, Security SANS, 2009.   

RITI Advanced Management Program RAMP, Regional Information Technology Institute RITI, 2008.   

Publications

“Enhanced TCP-Friendly Rate Control for Supporting Video Traffic over Internet”, Mohammad A. Talaat, Gamal M. Attiya, and Magdi A. Koutb, Canadian Journal of Electrical and Computer Engineering CJECE, vol. 36, no. 4, 2013.   

“ETFRC: Enhanced TFRC for Media Traffic over Internet”, International Journal of Computer Networks, IJCN, vol. 3, no. 3, pp. 167-177, August 2011.  

“ETFRC: Enhanced TFRC for Media Traffic”, International Journal of Computer Applications, IJCA, vol. 18, no. 6, pp. 1-8, March 2011.   

“PSNR Evaluation for Media Traffic over TFRC”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Networks & Communications IJCNC, vol. 1, no. 3, pp. 71-76, October 2009.   

“A Survey on Unicast Congestion Control Protocols for Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Science and Network Security IJCSNS, vol. 9, no. 3, pp. 254-261, March 2009.   

“Congestion Control for Internet Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, World Academy of Science, Engineering, and Technology WASET Proceedings, vol. 44, pp. 208-212, Venice, Italy, August 2008.   

“Content-Aware Adaptive Video Streaming System”, Mohammad A. Talaat, Magdi A. Koutb, Hamdy M. Kelash, and Reda H. Aboelez. Published in the proceedings of the following conferences:   

Information and Communications Technologies ICT 2005, Cape Town, South Africa, May 2005.   

International Conference on Information and Communications Technologies ICICT 2005, Cairo, Egypt, Dec. 2005.

Accreditation

This course is accredited by CPDQE. The demand for professionals to engage in Continuing Professional Development is escalating, irrespective of the industry, career stage, or job function. CPD serves as an impactful mechanism for skill enhancement, maintaining the relevance of academic credentials, and strategically advancing one’s career. 

This CPDQE Certified Course will ensure that you have obtained the required CPD trainings for your professional development.

Demo Certificate

Course Curriculum

Section 01: Introduction
intro – Cybersecurity in 90 Minutes 00:04:00
Section 02: Securing Passwords
Securing Passwords 00:10:00
Section 03: Securing Operating Systems
Securing Operating Systems 00:10:00
Section 04: Firewalls
Firewalls 00:11:00
Section 05: Securing Switches
Securing Switches 00:09:00
Section 06: Securing Routers
Securing Routers 00:08:00
Section 07: Securing Wireless Networks
Securing Wireless Networks 00:10:00
Section 08: IDS, IPS, and Honeypots
IDS, IPS, and Honeypots 00:11:00
Section 09: Antiviruses
Antiviruses 00:09:00
Section 10: Encryption
Encryption 00:06:00
Section 11: Physical Security
Physical Security – Cybersecurity in 90 Minutes 00:07:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

Choose Your Plan

**Additional shipping charge will be added for international delivery outside UK
TAKE THIS COURSE