1. Home
  2. Training Library
  3. Course Introduction

Course Introduction

Developed with
QA

Contents

keyboard_tab
Foundation Certificate in Cyber Security (FCCS)
1
Course Introduction
PREVIEW3m 29s

The course is part of this learning path

Foundation Certificate in Cyber Security
course-steps
5
certification
21
description
1
play-arrow
Course Introduction
Overview
DifficultyBeginner
Duration3m
Students676
Ratings
4.7/5
starstarstarstarstar-half

Description

We begin with an introduction to the course and what you can expect from the videos and quizzes in this learning path.

Learning Objectives 

The objectives of this course are to provide you with and understanding of: 

  • Why cyber security is important 
  • The structure and components of each of the 4 modules
  • Hints and tips for getting the most out of this Learning Path 

Intended Audience 

This course is ideal for members of cyber security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities. It acts as a foundation for more advanced managerial or technical qualifications. 

Prerequisites  

There are no specific pre-requisites to study this course, however a basic knowledge of IT, an understanding of the general principles of information technology security, and awareness of the issues involved with security control activity would be advantageous. 

Feedback 

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if would like help getting started. 

 

Transcript

Welcome to this foundation course in cyber security. 

 

Cyber security covers a multitude of different concepts, and throughout this course we will be examining some of the most key areas. 

 

This learning path is at a foundation level but we'll give you a solid level of awareness and understanding of cyber security as a whole. We will look at obvious cyber security concepts, such as protecting computers and networks, as well as touching on subjects that you might think are unrelated, such as physical and personnel security. We will also look at some fundamental computing concepts, such as computer components, and how computers can be joined together in networks. 

 

Throughout the learning path there will be regular knowledge checks to test your understanding and reinforce learning. 

 

By the end of this learning path you will be able to define what is meant by the term cyber security, and confidently describe measures that will lead to an improved cyber security position for your organization. We believe that you will find this course interesting and worthwhile, and look forward to welcoming you on further courses as you continue your development as a cyber security professional. 

This learning path is structured into four modules. 

 

The first module focuses on computing and networking fundamentals. It will help you to move into the rest of the learning paths with confidence as you will understand the fundamental ways that computing and networking works. 

 

The second module is about cyber security fundamentals. Once you've completed it, you will have a much better idea of how cyber security can be exploited and the things you can do to protect your organization. 

 

The third module focuses on governance and risk. A lot of cyber security is about being able to identify risks and mitigating these with strong governance. 

 

The fourth module focuses on security in general. In this module you will learn about the various security concerns that you need to take into account to properly protect your organization. 

 

Each module delivers the essential knowledge you will need through video lectures and reference guides. These are supported where appropriate by other resources, links to further information, and quizzes. 

 

The quizzes are included after each video lecture to help you check your understanding of the knowledge contained in the video. You'll be given feedback after each question so you can check how well you are doing and revisit any areas you feel you need to. You can attempt the quizzes as many times as you like. You'll have your own approach to learning, however these tips might help you get the most from this course. 

 

Try to complete the course within three months. That way what you learn at the beginning of the course will still be fresh in your mind when you take the exam. In any single learning session try to complete an entire learning path or failing that, a complete video lecture and quiz. Try to complete the quizzes for the videos as you go. They'll help you build and consolidate your knowledge. 

 

One final thing. Feedback on our courses is valuable to us and any students that need to take the same course in the future. If you have any feedback, positive or negative, please let us know. Thank you and we hope you enjoy the course.

About the Author
Students1684
Courses5
Learning paths5

Paul began his career in digital forensics in 2001, joining the Kent Police Computer Crime Unit. In his time with the unit, he dealt with investigations covering the full range of criminality, from fraud to murder, preparing hundreds of expert witness reports and presenting his evidence at Magistrates, Family and Crown Courts. During his time with Kent, Paul gained an MSc in Forensic Computing and CyberCrime Investigation from University College Dublin.

On leaving Kent Police, Paul worked in the private sector, carrying on his digital forensics work but also expanding into eDiscovery work. He also worked for a company that developed forensic software, carrying out Research and Development work as well as training other forensic practitioners in web-browser forensics. Prior to joining QA, Paul worked at the Bank of England as a forensic investigator. Whilst with the Bank, Paul was trained in malware analysis, ethical hacking and incident response, and earned qualifications as a Certified Malware Investigator, Certified Security Testing Associate - Ethical Hacker and GIAC Certified Incident Handler. To assist with the teams malware analysis work, Paul learnt how to program in VB.Net and created a number of utilities to assist with the de-obfuscation and decoding of malware code.