Cyber Security (12 month access)

Module 1 – Cyber Security

Lesson 1: Exploring the fundamentals of networking

In this lesson, we willl be exploring the fundamentals of networking. We will look at network topology, how data is created, the OSI -TCP/IP stack, identifying different devices in a network, and understanding how different networks create the internet.

Lesson 2: Setting up a Small Network

Today we explore the different hardware involved in Cyber Security. Computers, laptops, mobile devices, network printer, tablets, routers, switches, network interface cards, network cables and access points! We also look at the creation of traffic (data) on devices and how they are transferred to the ISP (Internet Service Provider). 

Lesson 3: A Wireless Network and Types of Access Points

Explore wireless routers and access points, and how they operate. Manage an on-premise access point and understand cloud-managed access points, and the benefits of using them. We’ll take an in-depth look at how devices are connected wirelessly, the capabilities of networking, and how a wireless network adaptor works. You will also have a solid understanding of the different types of wireless networks, which are WAN(Wide Area Networks), LAN(Local Area Networks), and PAN( Personal Area Network). 

Lesson 4: Types of Wireless Access Points

This lesson will provide a solid understanding of the different types of wireless networks, which are WAN(Wide Area Networks), LAN(Local Area Networks), and PAN( Personal Area Network). 

Lesson 5: Logical Addressing

In this section, we will be covering the concept of logical addressing, how CPU generates the logical address, and how to map the logical address with the memory-management unit to its corresponding physical address. 

Lesson 6: Enterprise Network Infrastructure

In this lesson, we will be exploring in-depth an enterprise network where we will be looking at deployment, virtualisation, different enterprise infrastructure options, examining their structures and benefits. and lastly a comparison between them. 

Lesson 7: The Design and Deployment of an Enterprise Network

In this lesson, we will be exploring enterprise portal, examining some component and features of a portal in an enterprise network, their benefits and lastly enterprise policies, examining some policy been used in an enterprise network. Exploring cloud-Based infrastructure, common types of Cloud-Based infrastructure, examining an illustration Cloud-Based infrastructure based on the recent development, exploring types and benefits of Cloud-Based infrastructure. 

Lesson 8: Exploring Protocol Analyzers

In this lesson, we will be exploring the concept of protocol analyzers, examining what they are, their functions and showing how it helps network engineers and other IT personnel to better understand network traffic. Also conducting a lab demo using Wireshark to conduct forensics on network protocol such as DNS, ARP, UDP, TCP, HTTP, and HTTPS. 

Module 2 – Cyber Security

Lesson 1: Principles of Network Security

In this lesson, we will be exploring the principles of networking, network security threats & attack, network vulnerabilities, highlighting the difference between threats, malware, vulnerability and risks, examine the evolution of common security threats. Exploring different types of attacks and the tools used by threat actors, highlighting the different stages of network attacks, exploring common malware Behaviours and common ways of identifying network security threats. 

Lesson 2: Risk of Network Attacks

In this Lesson, we will be exploring in-depth attacks that could occur within the OSI model, highlighting some reasons why networks and data are attacked, also looking at the impacts of network attacks on business. Examine the war against cybercrime, exploring the mission of security operations centre (SOC), highlighting the roles people play in a SOC environment, and also focus on the technologies in the SOC environment and lastly, we will conducting a Lab showing how to extract an executable from a PCAP with Wireshark. 

Lesson 3: Exploring Industrial Espionage

In this lesson, we will be exploring the concept of Industrial espionage, examining some Industrial espionage example, highlighting some impact of Industrial espionage on business, exploring threat Landscape, In-depth focus on ransomware as a service(RaaS), examining Wanna Cry ransomware, it’s Characteristics, identify the common Indicators of Compromise (IOCs) for common ransomware. And lastly conducting a lab demonstration to how to extract an Executable from a PCAP on Wireshark. 

Lesson 4: Examine Threat Landscape in-depth

In this lesson, we will be exploring the concept of Pervasive Ransom-ware Threat in-depth where we will be highlighting on some RAAS operations, examine some common trends, activities, tactics, techniques, and procedures in Cybercrime, and lastly, we will conduct a lab demonstration showing how to map a network using network mapping tools. 

Lesson 5: Analysis Threat Report on Cyber Espionage

In this lesson, we will be examining attack in-depth focus more on a User case scenario of an attack going through all stages from Reconnaissance, Initial Access, Executions, Lateral Movements, and Stealing Credentials on an enterprise network. And lastly, a lab demonstration where we compare Telnet traffic and SSH traffic on Wireshark. 

Lesson 6: Understanding MITRE ATT&CK

In this lesson, exploring the Concept of MITRE ATT&CK to fully understand Cybersecurity, looking in-depth into how and why Security operations center (SOC) team use MITRE ATT&CK to mitigate attacks in an enterprise network, and lastly, we will having a Lab demonstration where I will be showing how Brute-force attack works. 

Lesson 7: Threat Intelligence in MITRE ATT&CK

In this lesson, we will be exploring the concept of Threat Intelligence, open-source intelligence and also highlight why it is been used by Security operations center (SOC) analysts, also shows the framework in Security operations center team development, and lastly, we will be conducting a Lab Demo where we will examine a pcap file which contains packets of SQL injection attacks on a database on Wireshark. 

Lesson 8: Threat Intelligence and Threat-Informed Defence in MITRE ATT&CK

In the lesson, we will be highlighting the deployment of Threat-Informed Defense and ATTACK within the SOC environment, examine how cybersecurity Intelligence is used in a SOC Team, and lastly, conducting a Lab Demo showing ARP-Spoofing/ DOS attack Over Wi-Fi. 

Module 3 – Cyber Security

Lesson 1: Introduction to Network Security

Explore the concept of network security, and inspect security that could be implemented in the OSI Model. We’ll examine types of network security for businesses and online users, and then conducting a demonstration showing how you to navigate within a Linux Distribution. 

Lesson 2: Emerging Trends in Network Security

Examine some emerging security solutions and highlight the use of strong hardware authentication, passwords/biometrics, and exploring password policy. Understand the concept of VPN tunnelling and lastly there will be a demonstration on examining VPN traffic on Wireshark. 

Lesson 3: Antivirus and Antimalware Software in Network Security

In this lesson we will be learning how to identify a threat in a system using anti-malware. We’ll explore antimalware software and its use of Artificial Intelligence and Machine Learning in real-time protection and on-demand scanning, and end with a demonstration of encrypting and de-encrypting data using OpenSSL and Hacking tools. 

Lesson 4: Network segmentation for IoT devices

This lesson focuses on network segmentation for IoT devices on an enterprise network. We will be implementing network segmentation on a switch and also walk through how to boost network performance. 

Lesson 5: Access control for IoT Devices

In this lesson, we explore the concept of the access control list. We will highlight the benefits of ACL on a network by showing the operation of ACL structure, and some best practices with ACL. We will also include a demonstration of how to configure an ACL on a network. 

Lesson 6: Intrusion Prevention and Detection Systems

In this lesson, we will be exploring the security of applications, serves to examine the use of Authentication, Authorization, and Accounting(AAA). we’ll explore its benefits in application security, how it is applied, and the role of encryption within it and lastly a lab demonstration on Securing wireless devices on a network. 

Lesson 7: Behavioural Analytics in Network Security

In this lesson we will be looking at data analytics, including how to use analytics to build user-centric behavioural patterns. We’ll discuss the benefits of behavioural analytics, particularly with Artificial Intelligence and Machine Learning, and we’ll explore the use of centralised WLAN management tools to improve network security. 

Lesson 8: Assessing Endpoint Vulnerability

In this lesson, we will be assessing endpoints for vulnerability. We’ll highlight network profiling for end-devices and unpack the concept of the Common Vulnerability Scoring System. We’ll also look at compliance frameworks and exploring risk management on an enterprise network. 

What you will get
Lifetime access to the courses you purchase
As a Learnt member you have access to courseware you have purchased which is stored in your personal platform for a lifetime of learning.

Learn from anywhere, anytime
With 100% online courseware you can conveniently complete at your own speed. You can learn from anywhere using your choice of device.

Flexible payment options
With affordable weekly payments (afterpay, debit success)

Industry leading courses
You can start learning straight away, designed with the learner in mind. Customers gain access immediately to the courseware they have purchased simply via a link emailed to them.

Dedicated support while you learn
Simply contact us via live chat, phone or email to speak to a Learnt expert.

What our learners have to say

circleimg

In my role as a salesperson at Rebel Sport Miranda, I have found the information, skills and training on the Learnt Platform has increased my knowledge of the Retail industry and has made my role much more rewarding.
Sara Johnstone

Course sections
  • crimg
    Cyber Security

    In this online cybersecurity certification course you will develop your IT knowledge and gain the cybersecurity skills required to protect and defend IT systems and information in the digital age.

Course details

$249

12 month access

Chief Information Security Officer
Security Architect
Cybersecurity Engineer
Malware Analyst
Penetration Tester
Computer Forensics Analyst
Security Software Developer
Security Consultant
Penetration Tester 

Online

Payment options

afterpay
AfterPay
latitude
Latitude Pay
Coming Soon…

Got  a question?

Speak to one of our Learnt experts!

"*" indicates required fields

Request to call back*

FAQ’s

How do I get started?

You can start right away! Once you have completed the sign-up process and completed your checkout successfully, you can start learning on the spot. You will receive a confirmation email and a receipt for your purchase. This email will contain your course login details, and instructions on how to access and log in to your course. Don’t forget to check your junk/spam folder if you do not receive this email.

A willing attitude and a computer/tablet/phone are all you need to get started! You do not need any pre-requisites to complete any of our online courses. However, if you have any further questions, feel free to contact us at hello@learnt.global

Our online training doesn’t require you to be a tech genius, however basic computer skills are required to complete our courses. Fundamental computer skills such as typing, understanding how to navigate a computer and basic Microsoft office are ideal for getting the most out of your learning.

When undertaking courses with Learnt, you have access to support via our Learnt experts. Simply use our contact us form on the website, call us or request a call back and our team will be in touch!

Alps

Technology

Excel (12 month access)

Alps

Technology

Game Design and Development (12 month access)

Alps

Technology

Coding and Technology (12 month access)

Alps

Technology

Data Analytics (12 month access)

Alps

Technology

Probability and Statistical Analysis (12 month access)

Alps

Technology

Python Programming (12 month access)

Make your business better everyday with LEARNT and Qantas Business Rewards. Earn 30 Qantas Points per $1 spent when you purchase any new annual Business in a Box subscription by 31 July. T&C’s apply.
Our Hospitality Business in a Box subscriptions give you training straight away, meaning your team can upskill while you focus on other important areas of your business. PLUS for a limited time only, purchase any new annual subscription and earn 30 Qantas Points per $1 spent. T&C’s apply.
Did you know when you sign up to LEARNT you get exclusive access to our taster courses? Sign up now to start your learning on the spot! Click the link in bio to sign up and don't forget to enter our Valentines Day competition.
.
.
.
.
.
#learnandearn #onlinelearning #creativelearning #educationispower #education  #learning  #elearning  #distancelearning  #onlinecourses
| LEADERSHIP IN A BOX | Refresh and challenge yourself as a leader with the help of renown executive coach, Peter Hislop. Presented by Executive Masterclass, Peter coaches you through the essential learnings to develop your leadership skills as he has done for many years with politicians, CEO's and other high end clients. Click the link in our bio to start learning today!
Schools out for good! 🎉  So what now? With LEARNT you can still have fun with your friends but also get a head start on your career. Flexible Travel & Tourism, Pet Care & Veterinary and Fitness courses are ready for you to learn on your time today!
.
.
.
.
.

#learnt #onlinelearning #schoolies #schoolleavers #creativelearning #educationispower #education #learning #elearning #distancelearning #onlinecourses
Christmas is in 40 days. Is your small business ready?

Ensure your team thrive, and not just survive during the Christmas mayhem. Let LEARNT train your team with our industry specific course subscriptions!
Style your house effortlessly or kickstart your career in Interior Decorating with LEARNTs online Interior Decorating course!

Available now via the link in our bio.
Did you know you can know learn how to make a Kokedama in the comfort of your own home with @learnt.global ?

With our step by step video course, you’ll be an expert in no time!

Click the link in our bio to find out more 🌱

#kokedama #kokedamaworkshop #plantsofinstagram #plantlove #onlinelearning #learnt
Love organisation? Always the go to party planner among your friends? Maybe a career in Events could be your true calling!

Check out our range of Hospitality courses and you could be planning your next career move sooner than you think!
Considering a career shift as the world opens up? Whether you want to work on the ground as a travel agent or in the air as a flight attendant, kick start your career with LEARNT.
Whether you're passionate about a career with kids, or a parent simply wanting to learn more - our range of courses are ideal for anyone on the go. Nurturing Creativity in Children, Healthy Eating for Kids and Advanced Childcare online courses are all conveniently available for you to start now!
Dreaming of Fashion Design? Maybe you want to start your own fashion label or join a powerhouse brand? Make your dreams a reality with LEARNT's Fashion Design course!
This error message is only visible to WordPress admins
Error: Access Token is not valid or has expired. Feed will not update.