• No products in the cart.

Unit Name: Implementing and Managing Cyber Security

Unit Code: K/618/7845

Level: 7

Credit: 20

GLH: 100

Unit Aims:

This unit aims to provide learners with the necessary knowledge and understanding of securing computing systems and how to implement and manage cyber security in an enterprise environment. The unit will focus on the core principles to consider in order to secure systems appropriately. Learners will develop the knowledge and skills relating to security, detection, information and attack management in order to protect an organization in the event of a cyber security attack.

Specifications for Level 7 Computing:

ATHE Level 7 Diploma in Computing Technologies Specification Final v1

Please click the link below to view the guidelines:

ATHE-Definition-of-GLH-TQT-and-Credits

Video Link 1:

Course Curriculum

1. Understand the principles of cyber security
1.1 Explore the types of cyber-attacks that exist Details 00:00:00
1.2 Analyze the implications to an organization of having a cyber attack Details 00:00:00
1.3 Explain the organisational policies and procedures which need to be in place to protect against cyber security attacks Details 00:00:00
1.4 Explore the benefit of monitoring users, devices, and activity on a network Details 00:00:00
1M1 Examine the process of creating a cyber security culture in an organization Details 00:00:00
1D1 Analyze how home working can increase the risks of a cyber security attack Details 00:00:00
2. Understand the importance of user awareness
2.1 Analyze the importance of training staff on cyber security Details 00:00:00
2.2 Examine methods and content needed for training staff on cyber awareness Details 00:00:00
2.3 Evaluate the processes used to keep up to date with emerging cyber trends Details 00:00:00
2M1 Analyze how users contribute to cyber security risks Details 00:00:00
2D1 Create a sample user information document on the current threats and protection methods to organizations Details 00:00:00
3. Understand cyber security protection methods
3.1 Analyze the purpose of implementing cyber security measures across an organization Details 00:00:00
3.2 Evaluate the methods used to protect systems Details 00:00:00
3.3 Analyse how to deploy security protection methods Details 00:00:00
3.4 Analyse how to configure system settings to increase security Details 00:00:00
3.5 Analyse the considerations to make when recommending cyber security protection methods Details 00:00:00
4. Understand cyber security testing
4.1 Evaluate the importance of completing vulnerability testing on a network Details 00:00:00
4.2 Evaluate the importance of scheduling simulated attacks on a network Details 00:00:00
4.3 Explain how to configure and test application and network security Details 00:00:00
4M1 Analyse the impact cyber security testing has on an organization’s cyber security rating Details 00:00:00
5. Understand how to manage a cyber-attack
5.1 Analyse the steps to take when there are indicators of a cyber attack Details 00:00:00
5.2 Explain the communication methods used to inform stakeholders of a potential or actual cyber attack Details 00:00:00
5.3 Examine the process of completing a root cause analysis Details 00:00:00
5.4 Evaluate changes in cyber security working practices as a result of findings Details 00:00:00
6. Be able to manage cyber security in an organization
6.1 Install protection methods on end point devices Details 00:00:00
6.2 Setup and configure group policies on software Details 00:00:00
6.3 Setup and configure monitoring software on a network Details 00:00:00
6D1 Create a documented plan on how to manage a cyber-attack in an enterprise environment Details 00:00:00
Slides for Implementing and Managing Cyber Security
Implementing and Managing Cyber Security Lecture 1 Slides Details 00:00:00
Implementing and Managing Cyber Security Lecture 2 Slides Details 00:00:00
Implementing and Managing Cyber Security Lecture 3 Slides Details Unlimited
Implementing and Managing Cyber Security Lecture 4 Slides Details Unlimited
Implementing and Managing Cyber Security Lecture 5 Slides Details Unlimited
Implementing and Managing Cyber Security Lecture 6 Slides Details 00:00:00
Implementing and Managing Cyber Security Lecture 7 Slide Details 00:00:00
Recorded Lectures for Implementing and Managing Cyber Security
Lecture 1 Implementing and Managing Cyber Security Details 00:00:00
Lecture 2 Implementing and Managing Cyber Security Details 00:00:00
Lecture 3 Implementing and Managing Cyber Security Details 00:00:00
Lecture 4 Implementing and Managing Cyber Security Details 00:00:00
Lecture 5 Implementing and Managing Cyber Security Details 00:00:00
Lecture 6 Implementing and Managing Cyber Security Details 00:00:00
Assignment Brief for Implementing and Managing Cyber Security
Assignment Brief for Implementing and Managing Cyber Security Details 00:00:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

22 STUDENTS ENROLLED

Subscribe From

ABOUT US

HN International is a Multi-National Organization; operating in Bahrain, UK, UAE, & Canada. HN International imparts knowledge and skills to million of users worldwide.

Bahrain:
HN International, Khalid Building, Office 31, Building 419, Road 1805, Exhibition Avenue, Block 318 – Hoora, Manama, Kingdom of Bahrain.

Call/Whatsapp: +973 36811942

Saudi Arabia:
HN International Limited, Al-Chaya Building, 4th Floor, Office no. 8, Right Side Entrance, Sabaeen Street, Aziziyah, Jeddah, Saudi Arabia.

Call/Whatsapp: +966 564590125

UK:
International House 12, Constance Street, London, England, E16 2DQ

Call/Whatsapp: +44 7397 890304

UAE: Ras Al Khaima Free Zone, RAK , UAE.

Canada:
Windsor, Ontario, Canada.

Call/Whatsapp: +1 (647) 781-7124

info@hninternationaledu.com

top
© HN International. All rights reserved.
  • Contact Us
    Contact Form