Skip to main content

IT Cyber Security Training Bundle

LE049

Build a complete cyber security skill set with this all-in-one training bundle.

Course duration

Up to 12 months.

Course outcome

  • Certificate of achievement for each course completed.
  • Option to take formal assessments.

Entry requirements

There are no specific entry requirements for this course.

Assessment

Exams – this will be dependent on the certification within the bundle being studied.

Study Options

This course is only available to study online.

Study Options

 
£449.00
Course code: LE049

Buy now, pay later

Pay monthly options available in checkout.

KlarnaPay in 3 or Pay in 30 Days. Interest Free.
Snap WidgetFlexible payment plans from 18 to 48 months for customers from all credit backgrounds
visamaestromastercardpaypalamexdiscoverdinerselo

Course overview

With the rapid expansion of online business and digital transformation, cybersecurity professionals are in higher demand than ever before.

This IT Cyber Security course bundle gives you the essential skills, certifications, and industry knowledge needed to protect organisations from evolving cyber threats.

You will:

  • Build a solid grounding in IT security through CompTIA Security+ (SY0-701) and Microsoft 98-367 MTA Security Fundamentals.
  • Develop specialist skills with CompTIA Linux+ (XK0-005) and CompTIA CySA+ CyberSecurity Analyst (CS0-003).
  • Advance into topics including CompTIA Advanced Security Practitioner (CASP) CAS-003 and CompTIA PenTest+ (PT0-003) for penetration testing and security architecture.
  • Gain professional management and governance expertise with Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA).
  • Explore cloud and enterprise-level security through Certified Cloud Security Professional (CCSP) and Certified Information Systems Security Professional (CISSP).
  • Strengthen your ethical hacking and investigative capabilities with Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI).

Course content

  • Module 1 - SY0-701 General Security Concepts
  • Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigations
  • Module 3 - SY0-701 Security Architecture
  • Module 4 - SY0-701 Security Operations
  • Module 5 - SY0-701 Security Program Management and Oversight

  • Module 1 - Performing Basic Linux Tasks
  • Module 2 - Managing Users and Groups
  • Module 3 - Managing Permissions and Ownership
  • Module 4 - Managing Storage
  • Module 5 - Managing Files and Directories
  • Module 6 - Managing Kernel Modules
  • Module 7 - Managing the Linux Boot Process
  • Module 8 - Managing System Components
  • Module 9 - Managing Devices
  • Module 10 - Managing Networking
  • Module 11 - Managing Packages and Software
  • Module 12 - Securing Linux Systems
  • Module 13 - Working with Bash Scripts
  • Module 14 - Automating Tasks
  • Module 15 - Installing Linux
  • Module 16 - Working With Modern IT Infrastructure

  • Module 1 - CompTIA CySA+ CS0-003 Basics
  • Module 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations
  • Module 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management
  • Module 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response and Management
  • Module 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication

  • Module 1 - Overview
  • Module 2 - Passive Reconnaissance
  • Module 3 –Active Reconnaissance
  • Module 4 - Physical Security
  • Module 5 - Social Engineering
  • Module 6 - Vulnerability Scan Analysis
  • Module 7 - Password Cracking
  • Module 8 - Penetrating Wired Networks
  • Module 9 - Penetrating Wireless Networks
  • Module 10 - Windows Exploits
  • Module 11 - Linux Exploits
  • Module 12 - Mobile Devices
  • Module 13 - Specialized Systems
  • Module 14 - Scripts
  • Module 15 - Application Testing
  • Module 16 - Web App Exploits
  • Module 17 - Lateral Movement
  • Module 18 - Persistence
  • Module 19 - Cover Your Tracks
  • Module 20 - The Report
  • Module 21 - Post Engagement Cleanup

  • Module 1 - Introduction
  • Module 2 - Information Security Governance
  • Module 3 - Information Security Risk Management
  • Module 4 - InfoSec Prog Development and Management
  • Module 5 - Information Security Incident Management
  • Module 6 - Exam Prep

  • Module 1 - Security And Risk Management
  • Module 2 - Asset Security
  • Module 3 - Security Engineering
  • Module 4 - Communication And Network Security
  • Module 5 - Identity And Access Management
  • Module 6 - Security Assessment And Testing
  • Module 7 - Security Operations
  • Module 8 - Software Development Security

  • Module 1 - Understanding security layers
  • Module 2 - Authentication, Authorisation, and Accounting
  • Module 3 - Understanding Security Policies
  • Module 4 - Understanding Network Security
  • Module 5 - Locking Down Server and Client
  • Module 6 - Key takeaways
  • Module 7 - Terms to Know

  • Module 1 - Introduction To Ethical Hacking
  • Module 2 - Footprinting and Reconnaissance
  • Module 3 - Scanning Networks
  • Module 4 - Enumeration
  • Module 5 - Vulnerability Analysis
  • Module 6 - System Hacking
  • Module 7 - Malware Threats
  • Module 8 - Sniffing
  • Module 9 - Social Engineering
  • Module 10 - Denial-of-Service
  • Module 11 - Session Hijacking
  • Module 12 - Evading IDS, Firewalls, and Honeypots
  • Module 13 - Hacking Web Servers
  • Module 14 - Hacking Web Applications
  • Module 15 - SQL Injection
  • Module 16 - Hacking Wireless Networks
  • Module 17 - Hacking Mobile Platforms
  • Module 18 - IoT AND OT Hacking
  • Module 19 - Cloud Computing
  • Module 20 - Cryptography

Extra information

To receive the full certification, you will be required to complete the formal assessment associated with each course.

Once enrolled, you will have 12 months access to course content.

This blended learning solution offers a highly interactive and engaging learning environment with video demonstrations, multimedia presentations and educational games to assist with your study. Fun quizzes and exam simulators after each module reinforce your confidence and aid progression to the next stage. This course also includes the use of social networking forums, so you chat and gain friendly advice and support from other students.

Upon successful completion of each specification in this bundle, you will receive a certificate of completion so you can showcase your achievement to future employers.

Completing the Cyber Security Training Bundle can open opportunities to a variety of roles including;

• Entry level cybersecurity
• Cybersecurity data analyst
• Manager IT cybersecurity
• Senior cybersecurity engineer
• Cybersecurity lead
• Cybersecurity business analyst

FAQs

No previous knowledge is required to enrol onto this course, just a basic knowledge of IT.

No. Everything you need is included in the price!

That's not a problem. We want to make sure you're 100% confident about enrolling on the course and starting your study. So, just give our team of education specialists a call on 0121 329 4656 and they'll do their best to help.

Related courses