1. Home
  2. Training Library
  3. Course Introduction

Course Introduction

Developed with
QA

Contents

keyboard_tab
Foundation Certificate in Cyber Security (FCCS)
1
Course Introduction
PREVIEW3m 38s

The course is part of this learning path

Foundation Certificate in Cyber Security
course-steps 5 certification 21 description 1
play-arrow
Course Introduction
Overview
DifficultyBeginner
Duration4m
Students12
Ratings
5/5
star star star star star

Description

Course Description 

We begin with an introduction to the course and what you can expect from the videos and quizzes in this Learning Path.  

 

Learning Objectives 

The objectives of this course are to provide you with and understanding of: 

  • Why cyber security is important 
  • The structure and components of each of the 4 modules 
  • Hints and tips for getting the most out of this Learning Path 

 

Intended Audience 

This course is ideal for members of cyber security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities. It acts as a foundation for more advanced managerial or technical qualifications. 

  

Prerequisites  

There are no specific pre-requisites to study this course, however a basic knowledge of IT, an understanding of the general principles of information technology security, and awareness of the issues involved with security control activity would be advantageous. 

 

Feedback 

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if would like help getting started. 

 

Transcript

Welcome to this Foundation Course in Cyber Security. Cyber-Security covers a multitude of different concepts, and throughout this course we will be examining some of the most key areas.  

 

This course is at a foundation level, but will give you a solid level of awareness and understanding of cyber-security as a whole. We will look at obvious cyber-security concepts such as protecting computers and networks, as well as touching on subjects that you might think are unrelated, such as physical and personnel security. We will also look at some fundamental computing concepts such as computer components and how computers can be joined together in networks. 

 

 

Throughout the course, there will be regular knowledge checks to test your understanding and reinforce learning. By the end of this course you will able to define what is meant by the term cyber-security and confidently describe measures that will lead to an improved cyber-security position for your organisation. 

 

We believe that you will find this course interesting and worthwhile and look forward to welcoming you on further courses as you continue your development as a cyber-security professional.  

 

This course is structured into 4 Learning Paths.  

 

The first learning path focuses on computing and networking fundamentals. It will help you to move into the rest of the learning paths with confidence, as you will understand the fundamental ways that computing and networking works.  

 

The second learning path is about cyber security fundamentals. Once you have completed it, you will have a much better idea of how cyber security can be exploited and the things you can do to protect your organisation.  

 

The third learning path focuses on governance and risk. A lot of cyber security is about being able to identify risks and mitigating these with strong governance.  

 

The fourth learning path focuses on security in general. In this final learning path, you will learn about the various security concerns that you need to take into account to properly protect your organisation.  

 

Each learning path delivers the essential knowledge you’ll need through video lectures and reference guides. These are supported where appropriate by other resources, links to further information and quizzes. 

 

The quizzes are included after each video lecture to help you check your understanding of the knowledge contained in the video. You’ll be given feedback after each question so you can check how well you’re doing and revisit any areas you feel you need to. 

 

You can attempt the quizzes as many times as you like. 

 

You’ll have your own approach to learning. However, these tips might help you get the most from this course: 

 

Try to complete the course within three months – that way, what you learn at the beginning of the course will still be fresh in your mind when you take the exam. 

 

In any single learning session, try to complete an entire learning path – or, failing that, a complete video lecture and quiz. 

 

Try to complete the quizzes for the videos as you go – they’ll help you build and consolidate your knowledge. 

  

One final thing… Feedback on our courses is valuable to us and any students that need to take the same course in the future. If you have any feedback – positive or negative – please let us know.  

Thank you and we hope you enjoy the course. 

About the Author

Students134
Courses5
Learning paths1

Paul began his career in digital forensics in 2001, joining the Kent Police Computer Crime Unit. In his time with the unit, he dealt with investigations covering the full range of criminality, from fraud to murder, preparing hundreds of expert witness reports and presenting his evidence at Magistrates, Family and Crown Courts. During his time with Kent, Paul gained an MSc in Forensic Computing and CyberCrime Investigation from University College Dublin.

On leaving Kent Police, Paul worked in the private sector, carrying on his digital forensics work but also expanding into eDiscovery work. He also worked for a company that developed forensic software, carrying out Research and Development work as well as training other forensic practitioners in web-browser forensics. Prior to joining QA, Paul worked at the Bank of England as a forensic investigator. Whilst with the Bank, Paul was trained in malware analysis, ethical hacking and incident response, and earned qualifications as a Certified Malware Investigator, Certified Security Testing Associate - Ethical Hacker and GIAC Certified Incident Handler. To assist with the teams malware analysis work, Paul learnt how to program in VB.Net and created a number of utilities to assist with the de-obfuscation and decoding of malware code.