Your cart
![Cybersecurity in 90 Minutes - LearnDrive Key - GLOBAL](http://keynd.com/cdn/shop/files/07bd1b8be9dbb98b5de041b079c627d2_765x.png?v=1713280267)
Enrol in "Cybersecurity in 90 Minutes" to swiftly bolster your cybersecurity knowledge and implement practical security measures across your digital and physical assets. Sign up now to take a significant step towards enhancing your cybersecurity posture!
- Introduction: Begin with an overview of cybersecurity, understanding its importance in protecting personal and organisational data against cyber threats.
- Securing Passwords: Learn about the principles of strong password creation and management strategies to secure your digital accounts effectively.
- Securing Operating Systems: Dive into best practices for securing operating systems, including regular updates, patches, and the management of user privileges.
- Firewalls: Understand the role of firewalls in protecting networks from unauthorised access and how to configure them for optimal security.
- Securing Switches: Explore the security measures for network switches, including port security and VLAN configurations to prevent unauthorised network access.
- Securing Routers: Learn about securing routers to protect your network perimeter, focusing on ACLs (Access Control Lists) and secure routing protocols.
- Securing Wireless Networks: Dive into wireless network security, covering WPA2 encryption, secure Wi-Fi setups, and strategies to prevent unauthorised access.
- IDS, IPS, and Honeypots: Understand the functions of Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and the use of honeypots in detecting and mitigating cyber threats.
- Antiviruses: Explore the importance of antivirus software in detecting and removing malware, and how to choose and manage antivirus solutions effectively.
- Encryption: Learn about encryption techniques for securing data at rest and in transit, including the use of VPNs and encrypted messaging services.
- Physical Security: Conclude with the often-overlooked aspect of physical security measures to protect hardware and data storage devices from theft or damage.