Online Course in Cyber Security

Best Online Courses in Cyber Security 2017/2018

Cyber Security

An online course is typically part of a greater degree or diploma program. It may also be taken as a standalone experience, however, and typically entails a prescribed curriculum focusing on a given topic.

What is an online course in cyber security? An online course in cyber security is a class that introduces students to common security vulnerabilities in hardware, software and web-based applications as well as the methods used to identify and combat such threats. Students can expect to engage with a curriculum that covers historically notable cyber attacks, motives for these attacks and theories of programming and information technology that are relevant to better understanding cyber security.

This is a rapidly growing field, and as such, enrolling in a course can be majorly beneficial. In addition to the career opportunities it may provide, students are likely to gain a solid understanding of the most important cyber security principles.

Many different factors are taken into account when calculating your cost of attendance. As such, if you need an estimate, it is best to reach out to admissions offices for the most up-to-date information and figures.

There are plenty of career opportunities available from enrolling in an online course in cyber security. Students who go on to complete their degree or certificate program will be best qualified for jobs such as cyber security expert, computer programmer, software developer or web application specialist. These jobs are just a few of many, however, that may offer a promising path to students interested in this field of work. Alternately, you may work as an independent consultant and lend your expertise to technology companies and clients.

You can check with your school to see if an online course in cyber security is available. Search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

Read More

Course CISM Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

CISM certification training from Simplilearn, aligned to ISACA, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise to manage, design, oversee and/or assess an enterprise’s information security. [+]

Top Online Courses in Cyber Security. Key features 16 hours of self-paced videos 2 simulation exams and 88 knowledge-check questions for practice 65 end-of-chapter quizzes Offers the requisite 16 CPEs for taking the CISM examination 98.6% pass rate Course description What’s the focus of this course? CISM certification training from Simplilearn, aligned to ISACA, ensures you are re-equipped on the best practices in the industry and enables you to ace the exam in the first attempt. The certification helps you develop the expertise to manage, design, oversee and/or assess an enterprise’s information security. What are the course objectives? By the end of this training you will: Be able to define the architecture, design and manage the security of your organization. Acquire the relevant knowledge and skills required to clear the CISM certification exam Be able to demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives. Earn the requisite 16 CPEs required to take up the CISM certification exam Develop a working knowledge of the 4 domains areas as prescribed by ISACA –Exam Candidate Information Guide 2015. Who should take this course? CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is most suited for: Security Consultant/Manager IT Director/Manager Security Auditor/Architect Security Systems Engineer Chief Information Security Officer Information Security Managers IS/IT Consultants Chief Compliance/Privacy/Risk Officers Exam & certification How do you become a CISM certified professional? To be a certified CISM professional, you need to meet... [-]

Course CEH (V9) - Certified Ethical Hacker Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Simplilearn’s CEH®V9 (Certified Ethical Hacker) training and certification course provides hands-on classroom training to scan, test, hack and secure systems and applications. The extensive course on ethical hacking with 19 of the most current security domains give participants in-depth knowledge and practical approach to the current essential security systems. This course prepares for EC-Council Certified Ethical Hacker exam 312-50. [+]

Key features 32 hours of instructor-led training 6 months free access to CEHv9 iLabs Accredited Training Partner (ATP) of EC-Council Study Materials(e-Kit) by EC Council Tips and Tricks to clear CEH certification Exam Fee Included Course description What’s the focus of this course? Simplilearn’s CEH®V9 (Certified Ethical Hacker) training and certification course provides hands-on classroom training to scan, test, hack and secure systems and applications. The extensive course on ethical hacking with 19 of the most current security domains give participants in-depth knowledge and practical approach to the current essential security systems. This course prepares for EC-Council Certified Ethical Hacker exam 312-50. Why is the certification most sought-after? EC-Council CEH®V9 certification provides the impetus to enter the information security domain and certifies individuals in various information security skills. Many IT companies have made CEH certification a compulsory qualification for security-related posts making it a go-to certification for security professionals. What are the course objectives? Simplilearn’s CEH certification course provides a good start for learning web and mobile application security and expanding the present knowledge of identifying threats and vulnerabilities. Following are some of the learning benefits- It prepares candidates to handle information security with more clarity Helps them to understand the finer nuances of Trojans, Backdoors and Countermeasures Better understanding of IDS, Firewalls, Honeypots and Wireless Hacking Knowledge in advanced Hacking concepts – hacking Mobile devices & smart phones, Corporate Espionage, writing Virus codes, exploit writing & Reverse Engineering Expertise on advanced concepts like –Advanced network packet analysis, Securing IIS... [-]

Course: CISA Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Simplilearn’s CISA certification training is aligned to ISACA and ensures that you ace the exam in your first attempt. The training will enhance your understanding of IS audit processes and also help you understand how to protect information systems. [+]

Top Online Courses in Cyber Security. Key features 32 hours of instructor-led training 40 hours of self-paced videos 5 simulation exams for practice 10 industry-based case studies 5 domain-wise test papers to prepare you for CISA certification Course description What’s the focus of this course? Simplilearn’s CISA certification training is aligned to ISACA and ensures that you ace the exam in your first attempt. The training will enhance your understanding of IS audit processes and also help you understand how to protect information systems. What are the course objectives? By the end of this training, you will: Be able to identify and assess vulnerabilities, and report on compliance and institutional controls. Acquire the relevant knowledge and skills required to clear the CISA certification exam by ISACA. Gain a better understanding of IS audit and assurance guidelines, standards, and best practices for IS audit and control, governance of enterprise IT, acquisition, development, testing, and implementation of information systems. Develop working knowledge of the five domains of CISA, as prescribed by ISACA. Who should take this course? This training is essential for professionals dealing with controlling, monitoring, and assessing an organization’s information technology and business systems. This includes: IS/IT auditors/consultants IT Compliance Managers Chief Compliance Officers Chief Risk & Privacy officers Security heads/directors Security managers/architects Exam & certification How will I become a CISA certified professional? To become a CISA certified professional, you need to meet the following requirements: Clear the CISA examination Submit an Application for CISA Certification Adherence to the... [-]

Course: CISSP Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Simplilearn’s CISSP certification training is aligned to the (ISC) ² CBK 2015 and trains you in the industry’s latest best practices, which will help you ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards. [+]

Key features 32 hours of instructor-led training 32 hours of self-paced videos 5 simulation exams (250 questions each) for practice Offers the requisite 30 CPEs for taking the CISSP examination 8 domain-specific test papers (10 questions each) to prepare you for CISSP certification 98.6% pass rate Course description What’s the focus of this course? Simplilearn’s CISSP certification training is aligned to the (ISC)² CBK 2015 and trains you in the industry’s latest best practices, which will help you ace the exam in the first attempt. The certification helps you develop the expertise in defining the architecture, in designing, building, and maintaining a secure business environment for your organization using globally approved Information Security standards. What are the course objectives? By the end of this training, you will: Be able to define the architecture, and design and manage the security of your organization. Acquire the relevant knowledge and skills required to clear the CISSP certification exam. Earn the requisite 30 CPEs required to take up the CISSP certification exam. Develop working knowledge in the 8 domains areas prescribed by the CISSP Common Book of Knowledge, 2015. Who should take this course? The CISSP certification is a globally recognized professional requirement in the IT Security domain. This certification is best-suited for: Security Consultants/Managers IT Directors/Managers Security Auditors/Architects Security Systems Engineers Chief Information Security Officers Network Architects Exam & certification How do you become a CISSP certified professional? The CISSP exam is a computer-based test (CBT) administered at Pearson VUE Testing centers around... [-]

Course: COBIT 5 Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

The COBIT® 5 Foundation course is meant for IT professionals seeking knowledge and understanding of the governance and management of enterprise IT. It is the only business framework for the governance and management of enterprise IT. [+]

Top Online Courses in Cyber Security. Course description What’s the focus of this course? The COBIT® 5 Foundation course is meant for IT professionals seeking knowledge and understanding of the governance and management of enterprise IT. It is the only business framework for the governance and management of enterprise IT. The COBIT® 5 Foundation course offered by Simplilearn includes 6 lessons that cover the 5 principles and 7 enablers that form the basis of the COBIT® 5 business framework. Additionally, there are real-life scenarios and quizzes to supplant the training. On completing the COBIT® 5 Foundation course, you will be able to: Take up the COBIT® 5 Foundation exam and earn a COBIT 5 certificate Understand the IT management issues in your organization/enterprise and implement COBIT® to respond to those challenges Put into practice the knowledge you get from the COBIT® 5 framework, and recommend applications of COBIT® for enterprise-wide projects Take up advanced COBIT® 5 courses and their exams such as: COBIT® 5 Implementation - to master the governance of enterprise IT based on a continual improvement lifecycle; and COBIT® 5 Assessment - to be able to perform formal process capability assessments. Why is this certification popular? COBIT® 5 is the only business framework for governance and management of enterprise IT from ISACA®, the creators of the COBIT® 5 framework. ISACA as well as APMG, a leading certification body that facilitates the COBIT® 5 exam, note that COBIT® 5 provides an end-to-end business perspective of the governance of enterprise... [-]

Course CompTIA Security+ SYO-401 Certification Training

Simplilearn
Online Part time Open Enrollment USA USA Online

Simplilearn’s training in CompTIA Security+ SYO-401 arms IT technicians with the necessary knowledge to secure a network and manage risk, access control, cryptography along with other relevant IT security concepts. Participants at the end of the training are validated of their skills in information security which is one of the fastest progressing verticals in IT. [+]

Key features 30+ hours of self-paced videos Covers 6 domains required to become an IT security professional Includes 2 practice tests Course description What’s the focus of this course? Simplilearn’s training in CompTIA Security+ SYO-401 arms IT technicians with the necessary knowledge to secure a network and manage risk, access control, cryptography along with other relevant IT security concepts. Participants at the end of the training are validated of their skills in information security which is one of the fastest progressing verticals in IT. Why is the certification most sought-after? CompTIA Security+ SYO-401 certification is widely in demand globally, as it accelerates professionals to leap high in the technology vertical. Apart from this, there are several reasons why one should go for this certification. According to a CompTIA study: 86% of hiring managers said that IT certifications were of high priority while evaluating a candidate. 53% of IT recruiters said the job of evaluating certified candidates were much easier as it saved them time and money. Organizations that have a high number of certified help desk staff on board, can handle 11 % more phone calls and 28 % more field service calls than organizations with less number of certified staff. CompTIA certifications are a stamp of approval of a candidate’s fundamental knowledge and skillset required for IT jobs. This eases the hiring process considerably as the credentials are linked to specific job roles. Organizations understand the value of a CompTIA certified candidate. CompTIA certifications are highly acclaimed in the... [-]

Course in Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks

FutureLearn
Online Part time 2 weeks Open Enrollment United Kingdom UK Online

Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening. [+]

Top Online Courses in Cyber Security. Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening. In this course, you’ll explore some of the common cyber threats facing small and medium enterprises, what a cyber attack means, and what practical tools and strategies you can put in place to prevent them. Investigate a real cyber attack in action We’ll start by looking at the recent Panama Papers leak to find out more about cyber threats, the methods that hackers use, and what the consequences of cyber attacks can be for small and medium enterprises. Explore strategies for protecting your organisation against cyber attacks After viewing a simulation of a cyber attack in action, we’ll then take a look at some of the tools and preventative strategies that you can put in place to protect your organisation. Learn from cyber security experts Deakin University has been providing cyber security education since 2007. Our experts are active researchers and engaged in partnerships with leading industry bodies such as Dimension Data Learning Solutions, which ensures we develop our students’ real-world cyber security knowledge and skills. Take your learning to the next stage This course is a free introduction to a Deakin University postgraduate degree in Cyber security which can be done entirely on FutureLearn What topics will you cover? With more and more businesses operating online, the risks to organisations can range from... [-]

Course: Cyber Security & Ethical Hacker Expert - Training Package (with CISA, CISSP, CISM, CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the skills needed to reach the highest levels of IT security professionalism and stand out from the crowd with this all-inclusive five course Cyber Security & Ethical Hacker Expert package. [+]

What are the objectives of this course? The course includes all the materials needed to study towards obtaining the most recognised certifications in the industry: Certified Ethical Hacker (CEH) Using enumeration to catalogue system resources and potential routes to breach. Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks. The role of social engineering to steal confidential information directly from employees. Using sniffers and session hijacking to mask illegal access to system resources. Web-based attacks that can take online systems down. How wireless network security can be breached. How hackers avoid protective measures like IDS, firewalls and honeypots. Using cryptography and steganography to protect data. How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate. Computer Hacking Forensic Investigator (CHFI) How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources as required for the investigation. How to handle digital evidence to maintain legal standards. What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements. Acquiring and duplicating data Using Access Data’s Forensic Toolkit (FTK), EnCase and special steps to review data whilst leaving all evidence intact. Understanding steganography and how such techniques can be used to mask data theft. Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity. Certified Information Security Manager (CISM) Information security management How... [-]

Course: Cyber Security Expert - Training Package (with CISA, CISSP & CISM)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the advanced techniques required to protect network resources from external threat with this Cyber Security Expert bundle. [+]

Top Online Courses in Cyber Security. What are the objectives of this course? This comprehensive package is made up of three of the world’s foremost IT security courses and will give you the knowledge needed to build and manage effective security solutions. Certified Information Systems Auditor (CISA) Information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements. Codifying IT service delivery and support mechanisms and levels to ensure systems and users remain fully productive. Identifying critical information assets and designing systems to protect from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure Certified Information Systems Security Professional (CISSP) The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system. Telecommunications and network systems that need to be hardened to prevent data loss or theft. The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems. The importance of secure software architecture and design to help ensure that in-house systems protect data and resources. Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys. Using security... [-]

Course: Ethical Hacker Expert - Training Package (with CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package. [+]

What are the objectives of this course? The package is split into two courses. The first of these courses is built around the Certified Ethical Hacker certification: Understanding ethics involved in white hat hacking. How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. How to identify potential vulnerabilities. Enumeration Trojans, backdoors, viruses, worms and Denial of Service (DoS) attacks. The role of social engineering to steal confidential information directly from employees. Sniffers and session hijacking Web-based attacks Wireless network security How hackers avoid protective measures like IDS, firewalls and honeypots. Network forensic techniques Cryptography and steganography How to use the metasploit toolkit to assess network protection measures. The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through: How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is equally able to satisfy the demands of anyone... [-]

Course: CEH (Certified Ethical Hacking and Countermeasures) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the tools and techniques that hackers use to bypass security for your own corporate network defensive strategies with this Certified Ethical Hacking and Countermeasures course. [+]

Top Online Courses in Cyber Security. What are the objectives of this course? The knowledge gained in this course can help you to harden defences and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment. Intro to course Footprinting & Reconnaissance Scanning Networks Enumeration System Hacking Trojans & Backdoors Viruses & Worms Denial of Service Social Engineering Sniffers Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflows Cryptography Penetration Testing Who is it intended for? This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques. Requirements There are no pre-requisites for this course. What marks this course apart? Once you have completed this course you will be able to sit the Certified Ethical Hacking Certification 312-50 examination. Students will be able to function in roles such as ethical hacker, cyber security and penetration tester. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Course: CHFI (Computer Hacking Forensic Investigator) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the processes and tools required to investigate a serious security breach using industry-standard principles with this Computer Hacking Forensic Investigator (CHFI) course. [+]

What are the objectives of this course? This course covers everything needed to investigate, document and prosecute a malicious security breach. How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is ideal for anyone who has looking to build on their foundational ethical hacking skills. Requirements There are no official pre-requisites for this course but we recommend students have a basic knowledge of computer security and ethical hacking. What marks this course apart? Once students have completed this course they will be ready to sit their CHFI EC0 312-49 exam. Candidates will be able to function in roles such as forensic analyst, security analyst and information security analyst. These jobs usually average a salary of £27,000 a year. Source: PayScale What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Course: CompTIA Security+ 2014 (SY0-401) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Enter the IT security industry with the knowledge of the globally-recognised CompTIA best practice concepts in this course. [+]

Top Online Courses in Cyber Security. What are the objectives of this course? Learn the fundamentals of computer security with the vendor-neutral CompTIA Security+ course and live labs package where you will have 19 comprehensive modules to guide you through everything you’ll need to know to pass your exams. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. Network Terminology. Learn all you need to know about wireless. Introduction to security terminology. Identifying and satisfying compliance needs and policies for data security. Physical Security. Gain insight into disaster recovery, risk analysis, business continuity and business impact analysis. Introduction to Computer Forensics. Different types of attacks and system security threats and how they can be blocked. The use of encryption to protect data, even if it is intercepted by a third party. Cryptography Who is it intended for? Anyone who is looking to enter the world of IT security or any IT professional who is looking to upskill. Requirements There are no pre-requisites for this course. What marks this course apart? This qualification will provide you with all the knowledge you need to go into roles such as security architect, security administrator or security engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you... [-]

Course: CIW Web Security Associate Training with Exam (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Learn the importance of network security, how to do it and get certified with an industry-recognised qualification from CIW with this CIW Security Associate course with the official exam. [+]

What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. The examination is the 1D0-571 exam and consists of 62 questions that must be answered in a 90 minute time limit. In order to pass the course, candidates must achieve a minimum pass mark of 76%. Understand how hacker threats occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is designed for anyone who works within the network security field or anyone who is looking to go into the industry with a certification to back up... [-]

Course: CIW Web Security Associate Training (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Explore essential security principles that every IT security professional should know with this CIW Security Associate course. [+]

Top Online Courses in Cyber Security. What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. How hacker threat occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is for IT security professionals who want to study towards an industry-recognised certification, it is also for people who want to switch industries and go into IT security. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course, they are eligible to sit the 1D0-571 examination. They will be... [-]