The current landscape of cybersecurity requires specialised skills to troubleshoot via customised hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience. As a CASP-certified IT professional, you will demonstrate that you can provide the best cybersecurity solutions and protection for organizations worldwide.
Studying with Global Edulink has many advantages. The course material is delivered straight to you, and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand. This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests and exams. All delivered through an online learning system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months). An effective support service and study materials will build your confidence to study efficiently and guide you to secure your qualification.
1. Process of Underlying Security Models | |||
Process of Underlying Security Models – part 1 | 00:44:00 | ||
Process of Underlying Security Models – part 2 | 00:43:00 | ||
2. How to Select Security? | |||
How to Select Security? | 00:46:00 | ||
3. Understanding Cryptography | |||
Understanding Cryptography – Part 1 | 00:57:00 | ||
Understanding Cryptography – Part 2 | 00:44:00 | ||
4. Storage Tips | |||
Storage Tips | 00:37:00 | ||
5. Virtual Computing Methodologies | |||
Virtual Computing Methodologies – Part 1 | 00:33:00 | ||
Virtual Computing Methodologies – Part 2 | 00:34:00 | ||
6. Definition of IPv6 | |||
Definition of IPv6 | 00:25:00 | ||
7. Remote Access Security Techniques | |||
Remote Access Security Techniques | 00:22:00 | ||
8. Studying Domain Name System | |||
Studying Domain Name System – Part 1 | 00:38:00 | ||
Studying Domain Name System – Part 2 | 00:26:00 | ||
9. Working With Directory Services | |||
Working with Directory Services | 00:06:00 | ||
10. Learning of Firewall and VPN | |||
Learning of Firewall and VPN – 1 | 00:40:00 | ||
Learning of Firewall and VPN – Part 2 | 00:36:00 | ||
11. Security Configuration Management Techniques | |||
Security Configuration Management Techniques | 00:29:00 | ||
12. Understanding Network Infrastructure Security | |||
Understanding Network Infrastructure Security | 00:15:00 | ||
13. Overview of Secure Web Services - Part 1 | |||
Overview of Secure Web Services – Part 1 | 00:30:00 | ||
Overview of Secure Web Services – Part 2 | 00:23:00 | ||
14. Define Buffer Overflows and SQL Injection | |||
What are Buffer Overflows? | 00:24:00 | ||
Definition of SQL Injection | 00:16:00 | ||
15. Process of Access Controlling and Single Sign | |||
Process of Access Controlling | 00:16:00 | ||
Single Sign-On Tips | 00:21:00 | ||
16. Process of Risk Assessment and Assessment Techniques | |||
Process of Risk Assessment | 00:24:00 | ||
Testing and Assessment Techniques | 00:28:00 | ||
17. Definition of Common Vulnerability | |||
Definition of Common Vulnerability | 00:19:00 | ||
Understanding Common Criteria | 00:53:00 | ||
18. What is Personally Identifiable Information? | |||
WHAT IS PERSONALLY IDENTIFIABLE INFORMATION? | 00:17:00 | ||
19. Understanding Risk Management | |||
UNDERSTANDING RISK MANAGEMENT | 00:34:00 | ||
20. Definitions of Frameworks | |||
Definitions of Frameworks | 00:34:00 | ||
21. Explore Interconnecting Systems, Security Services and Continuous Monitoring | |||
Explore Interconnecting Systems | 00:18:00 | ||
Learning about Security Services | 00:31:00 | ||
Process of Continuous Monitoring | 00:53:00 | ||
22. Incident Handling and Response | |||
Way of Incident Handling | 00:38:00 | ||
Learning Forensic & Incident Response | 00:22:00 | ||
23. What is Requirements Processing? & Standards Bodies | |||
What is Requirements Processing? | 00:25:00 | ||
Identifying Standards Bodies | 00:08:00 | ||
24. Overview of Secure System Life Cycle | |||
Overview of Secure System Life Cycle | 00:16:00 | ||
25. Define of Email, BYOD and Voice Over IP | |||
Overview of Email | 00:08:00 | ||
Exploring Mobile and BYOD | 00:09:00 | ||
Definition of Voice Over IP | 00:09:00 | ||
26. Process of Physical Facilities Assessment | |||
Process of Physical Facilities Assessment | 00:14:00 | ||
Understanding Security Requirements Traceability Matrix | 00:04:00 | ||
Mock Exam | |||
Final Exam |
Adler Wayne
Good course and worth it.