We are upgrading our server for better user experience & our site will be down for a short period on 23rd November 2020, 8 PM to 12 PM GMT

CodeRed Pro 14 Month Subscription

0( 0 REVIEWS )
173 STUDENTS
Buy Now
£190 (inc. VAT)
  • 365 Days
  • Intermediate and Advanced
  • Wishlist
  • Awarded by 'EC-Council'
  • Course Material
  • Official Exam Included

What Will I Learn?

You will mainly learn latest concepts and technologies associated with Cybersecurity.
How to apply programming concepts in PHP and Python for Cybersecurity issues.
Latest precautions to be taken for Cybersecurity attacks.
Hands on lab experiences on dealing with Cyber threats.

What is CodeRed?

CodeRed is a subscription-based learning platform for busy cybersecurity professionals like you, created by EC-Council who is a leader in cyber security training. We are delighted to tell you that Global Edulink have partnered with EC-council to provide you to gain this enormous knowledge in Cybersecurity within a short span of time.

As you are aware the world is an insecure place as organisations and IT entities are vulnerable to various cybercriminal attacks. Thus for organisations, it has become a challenge to be safe from any cyber criminals as there exists a shortage in skills as well as lack of understanding on how to effectively use the cybersecurity tools at hand. Although certain industrial qualifications make the professionals equipped with skills need to combat from Cyberattacks, vast improvement in this area can be achieved by developing micro skills of cyber professionals vigorously.

Therefore CodeRed offers various types of Cybersecurity programmes in from of Microdegrees which enables the learner to dive deeply into advanced concepts of Cybersecurity within 200 hours of comprehensive learning. This would not be limited to merely studying theoretical aspects of subject matter but hands on learning experience to gain the practical knowledge that employers are seeking in real world projects. So this is a tremendous opportunity for you to grow your career and become a Cybersecurity professional. It will improve your critical Cyber skills within a short span of time.

CodeRed 14 month Subscription plan

When you register with CodeRed for 14 Moth Subscription plan, you will get:

  • Full access to the premium course library with:
    • 30+ Video Courses and 1500+ Premium Videos
  • Free Practical Demo Lab
  • World Class Instructors
  • New courses and content added weekly basis which will enhance the learner’s practical experience.
  • Lessons delivered by world class instructors.
  • Free practices with demo lab.

One of the key course in Micro degree programmes that is available currently when you register with 14month subscription plan is:

  • Python security MicroDegree.

Another fabulous course that is coming soon is:

  • PHP Security MicroDegree

So join with us today to become a cybersecurity professional.

  • Who is this course aimed at?
  • Entry Requirements
  • Certification
  • Awarding Body
  • Progression and Career Path
This course is ideal for those seeking to work as a Cybersecurity professionals or who are looking to enhance their career prospects in Cybersecurity.
Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.
Since Micro degrees are less subject base they focus more on the practical aspects that would enable the learner to gain more hands-on experience. You will mainly be assessed on experimental learning.

EC-Council is a global leader in creating information security trainings and certification programmes. EC-Council operates in 145 countries and is widely recognised for developing Certified Ethical Hacker and Certified Security Analyst amongst a range of courses and programmes. They are proud to have trained information security professionals globally and influenced the mindset of organisations around the world. Their primary goal is to certify individuals and organisations in information security skills.

Once you have gained the relevant qualifications you can earn up to average salary of £21,000 per year or £10.77 per hour in United Kingdom. Entry level positions with no experience starts at Entry level start at £15,054 per year while most experienced Cybersecurity professionals earn up to £35,700 per year.

Key Features

Gain an Accredited UK Qualification

Access to Excellent Quality Study Materials

Learners will be Eligible for TOTUM Discount Card

Personalised Learning Experience

UK Register of Learning Providers Reg No : 10053842

Support by Phone, Live Chat, and Email

Course Curriculum

-EXECUTIVE MANAGEMENT-
Certified Chief Information Security Officer (CCISO)
Governance and Risk Management 00:00:00
Information Security Controls, Compliance, and Audit Management 00:00:00
Security Program Management & Operations 00:00:00
Information Security Core Competencies 00:00:00
Strategic Planning, Finance, Procurement and Vendor Management 00:00:00
Course Demos 00:00:00
Government 00:00:00
Job Roles 00:00:00
OhPhish 00:00:00
Risk Management Approach and Practices (RM)
Introduction to Risk Management 00:00:00
The Essentials of a Risk Management Program 00:00:00
Risk Management Frameworks 00:00:00
Risk Management Policies and Procedures 00:00:00
Risk-Based Audits 00:00:00
Third-Party Risk Management (TPRM) 00:00:00
Risk Management Positions 00:00:00
Risk Law 00:00:00
Procurement Risk Management 00:00:00
Risk Culture 00:00:00
Future of Risk Management 00:00:00
-ETHICAL HACKING-
Certified Ethical Hacker (CEH)
Introduction to Ethical Hacking 00:00:00
Footprinting and Reconnaissance 00:00:00
Scanning Networks 00:00:00
Enumeration 00:00:00
Vulnerability Analysis 00:00:00
System Hacking 00:00:00
Malware Threats 00:00:00
Sniffing 00:00:00
Social Engineering 00:00:00
Denial-of-Service 00:00:00
Session Hijacking 00:00:00
Evading IDS, Firewalls, and Honeypots 00:00:00
Hacking Web Servers 00:00:00
Hacking Web Applications 00:00:00
SQL Injection 00:00:00
Hacking Wireless Networks 00:00:00
Hacking Mobile Platforms 00:00:00
IoT Hacking 00:00:00
Cloud Computing 00:00:00
Cryptography 00:00:00
Ethical Hacking Core Skills (EHCS)
Introduction To Required Skills For Security 00:00:00
Introduction & Overview 00:00:00
UNIX/Linux 00:00:00
Introducing Linux 00:00:00
Overview of Virtual Machines 00:00:00
Introduction to Vulnerability Assessment 00:00:00
Introduction to the Hacking Process Hacking Methodology 00:00:00
Challenges of Staying Current 00:00:00
-NETWORK SECURITY-
Certified Network Defender (CND)
Computer Network and Defense Fundamentals Response & Handling 00:00:00
Network Security Threats, Vulnerabilities, and Attacks 00:00:00
Network Security Controls, Protocols, and Devices 00:00:00
Network Security Policy Design and Implementation 00:00:00
Physical Security 00:00:00
Host Security 00:00:00
Secure Firewall Configuration and Management 00:00:00
Secure IDS Configuration and Management 00:00:00
Secure VPN Configuration and Management 00:00:00
Wireless Network Defense 00:00:00
Network Traffic Monitoring and Analysis 00:00:00
Network Risk and Vulnerability Management 00:00:00
Data Backup and Recovery 00:00:00
Network Incident Response and Management 00:00:00
-COMPUTER FORENSICS-
Computer Hacking Forensic Investigator (CHFI)
Computer Forensics in Today’s World 00:00:00
Computer Forensics Investigation Process 00:00:00
Understanding Hard Disks and File Systems 00:00:00
Operating System Forensics 00:00:00
Defeating Anti- forensics Techniques 00:00:00
Data Acquisition and Duplication 00:00:00
Network Forensics 00:00:00
Investigating Web Attacks 00:00:00
Database Forensics 00:00:00
Cloud Forensics 00:00:00
Malware Forensics 00:00:00
Investigating Email Crimes 00:00:00
Mobile Forensics 00:00:00
Investigative Reports 00:00:00
Dark Web Forensics
Technical Background 00:00:00
Tour of Markets 00:00:00
Investigative Techniques 00:00:00
Malware and Memory Forensics
Types of Analysis 00:00:00
In-memory Data 00:00:00
Memory Architectural Issues 00:00:00
Tools Used 00:00:00
Registry in Memory 00:00:00
Mobile Forensics
The Various Mobile Operating Systems 00:00:00
Forensic Methods 00:00:00
Mobile Networks 00:00:00
Cell phone hardware 00:00:00
Coverage of MobileEdit Forensics 00:00:00
Coverage of BlackBag Forensic 00:00:00
Coverage of Android Forensics with ADB 00:00:00
Overview of JTAG 00:00:00
-INCIDENT HANDLING-
Certified Threat Intelligence Analyst (CTIA)
Introduction to Incident Handling and Response 00:00:00
Incident Handling and Response Process 00:00:00
Forensic Readiness and First Response 00:00:00
Handling and Responding to Malware Incidents 00:00:00
Handling and Responding to Email Security Incidents 00:00:00
Handling and Responding to Network Security Incidents 00:00:00
Handling and Responding to Web Application Security Incidents 00:00:00
Handling and Responding to Cloud Security Incidents 00:00:00
Handling and Responding to Insider Threats 00:00:00
Certified SOC Analyst (CSA)
Security Operations and Management 00:00:00
Understanding Cyber Threats, IoCs, and Attack Methodology 00:00:00
Incidents, Events, and Logging 00:00:00
Incident Detection with Security Information and Event Management (SIEM) 00:00:00
Enhanced Incident Detection with Threat Intelligence 00:00:00
Incident Response 00:00:00
Certified Incident Handler (ECIH)
Introduction to Threat Intelligence 00:00:00
Cyber Threats and Kill Chain Methodology 00:00:00
Requirements, Planning, Direction, and Review 00:00:00
Data Collection and Processing 00:00:00
Data Analysis 00:00:00
Intelligence Reporting and Dissemination 00:00:00
-PEN TESTING-
Advanced Penetration Testing (APT)
Introduction to Vulnerability Assessment and Penetration Testing 00:00:00
Information Gathering Methodology 00:00:00
Scanning and Enumeration 00:00:00
Identify Vulnerabilities 00:00:00
Exploitation 00:00:00
Post Exploitation 00:00:00
Advanced Tips and Techniques 00:00:00
Preparing a Report 00:00:00
Practice Ranges 00:00:00
Certified Security Analyst (ECSA)
Penetration Testing Essential Concepts (Self-Study) 00:00:00
Introduction to Penetratiaon Testing and Methodologies 00:00:00
Penetration Testing Scoping and Engagement Methodology 00:00:00
Open-Source Intelligence (OSINT) Methodology 00:00:00
Social Engineering Penetration Testing Methodology 00:00:00
Network Penetration Testing Methodology – External 00:00:00
Network Penetration Testing Methodology – Internal 00:00:00
Network Penetration Testing Methodology – Perimeter Devices 00:00:00
Web Application Penetration Testing Methodology 00:00:00
Database Penetration Testing Methodology 00:00:00
Wireless Penetration Testing Methodology 00:00:00
Cloud Penetration Testing Methodology 00:00:00
Report Writing and Post Testing Actions 00:00:00
-SECURE CODING-
Certified Application Security Engineer (CASE .NET)
Understanding Application Security, Threats, and Attacks 00:00:00
Security Requirements Gathering 00:00:00
Secure Application Design and Architecture 00:00:00
Secure Coding Practices for Input Validation 00:00:00
Secure Coding Practices for Authentication and Authorization 00:00:00
Secure Coding Practices for Cryptography 00:00:00
Secure Coding Practices for Session Management 00:00:00
Secure Coding Practices for Error Handling 00:00:00
Static and Dynamic Application Security Testing (SAST & DAST) 00:00:00
Secure Deployment and Maintenance 00:00:00
Certified Application Security Engineer (CASE Java)
Understanding Application Security, Threats, and Attacks 00:00:00
Security Requirements Gathering 00:00:00
Secure Application Design and Architecture 00:00:00
Secure Coding Practices for Input Validation 00:00:00
Secure Coding Practices for Authentication and Authorization 00:00:00
Secure Coding Practices for Cryptography 00:00:00
Secure Coding Practices for Session Management 00:00:00
Secure Coding Practices for Error Handling 00:00:00
Static and Dynamic Application Security Testing (SAST & DAST) 00:00:00
Secure Deployment and Maintenance 00:00:00
PHP Security (MicroDegree)
Course Overview 00:00:00
Up and Running 00:00:00
Upgrading to PHP7 00:00:00
Securing Your Webserver 00:00:00
Serverless PHP 00:00:00
Defining Security Requirements 00:00:00
Leveraging Frameworks and Limitations 00:00:00
Secure Database Access 00:00:00
Encode and Escape Data 00:00:00
Validate Inputs 00:00:00
Implementing Digital Identity 00:00:00
Enforce Access Controls 00:00:00
Protect Data Everywhere 00:00:00
Implement Secure Logging 00:00:00
Handle All Errors and Exceptions 00:00:00
Practical OWASP Top 10 00:00:00
Conclusion 00:00:00
Python Security (MicroDegree)
Appendix Python Refresher 00:00:00
Working with Python Strings 00:00:00
Object Oriented Programming 00:00:00
File I/O 00:00:00
Databases 00:00:00
Automated Testing 00:00:00
Creating OS Binaries 00:00:00
Decorators 00:00:00
Python Collections 00:00:00
Parallel Processing 00:00:00
Documentation 00:00:00
Socket Programming 00:00:00
Packet Parsing 00:00:00
Cross-platform Programming 00:00:00
Python Cryptography 00:00:00
Non-Python Language Integration 00:00:00
Password Cracking 00:00:00
Analyzing Metadata 00:00:00
-BLOCKCHAIN-
Certified Blockchain Professional (CBP)
Blockchain Fundamentals 00:00:00
Applications of Blockchain Technology 00:00:00
Blockchain Project Implementation 00:00:00
Advanced Blockchain Development 00:00:00
-MOBILE SECURITY TOOLKIT-
STORM: Ethical Hacking Core Skills
STORM: Ethical Hacking Intermediate Skills
-IT PROJECT MANAGEMENT-
Certified Project Management (CPM)
Introduction to Project Management 00:00:00
Project Scope & Technology Integration 00:00:00
Project Scheduling & Time Management 00:00:00
Project Cost and Budget Management 00:00:00
Project Sourcing & Vendor Management 00:00:00
Project Controls & Quality Assurance 00:00:00
Project Opportunity & Risk Management 00:00:00
Project Governance & Team Management 00:00:00
Project Visualization, Analytics & Reporting 00:00:00
Project Stakeholder Engagement & Expectations Management 00:00:00
-DISASTER RECOVERY-
Disaster Recovery Professional (EDRP)
Introduction to Disaster Recovery and Business Continuity 00:00:00
Business Continuity Management 00:00:00
Risk Assessment 00:00:00
Business Impact Analysis 00:00:00
Business Continuity Plan 00:00:00
Data Backup 00:00:00
Data Recovery Strategies 00:00:00
Virtualization Bases Disaster Recovery 00:00:00
System Recovery 00:00:00
Centralized and Decentralized Computing 00:00:00
Disaster Recovery Planning Process 00:00:00
BCP Testing, Maintenance, and Training 00:00:00
-ENCRYPTION-
Certified Encryption Specialist (ECES)
Introduction and History of Cryptography 00:00:00
Symmetric Cryptography & Hashes 00:00:00
Number Theory and Asymmetric Cryptography 00:00:00
Applications of Cryptography 00:00:00
Cryptanalysis 00:00:00
-FUNDAMENTALS-
Certified Secure Computer User (CSCU)
Introduction To Data Security 00:00:00
Securing Operating Systems 00:00:00
Malware and Antiviruses 00:00:00
Internet Security 00:00:00
Security On Social Networking Sites 00:00:00
Securing Email Communications 00:00:00
Securing Mobile Devices 00:00:00
Securing The Cloud 00:00:00
Securing Network Connections 00:00:00
Data Backup and Disaster Recovery 00:00:00

Students feedback

N.A

Avarage rating ()
5 Star
4 Star
3 Star
2 Star
1 Star

No Reviews found for this course.

Buy Now
£190 (inc. VAT)
  • 365 Days
  • Intermediate and Advanced
  • Wishlist
  • Awarded by 'EC-Council'
  • Course Material
  • Official Exam Included
WhatsApp chat