Cybercrime and Cybersecurity

Not all heroes wear capes, some enroll in uCertify’s cybersecurity course to tackle monsters on the web!

(CYBERCRIME.AV1) / ISBN : 978-1-64459-597-8
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Do you aspire to become a cybersecurity expert? 

Then, our Cybercrime and Cybersecurity Course is made for you! 

We help you develop the hands-on skills required to defend your systems from any cyberattack with 10+ interactive lessons & 100+ practice exercises.   Convert your lessons into actions with our hands-on LABs, designed to help you gain real-world experience for better opportunities & experience. 

Take the first step towards your secure career by omitting cybercrime & inviting exciting opportunities, enroll now! 

Skills You’ll Get

  • Recognize & distinguish between Internal, External, Natural & Advanced threats. 
  • Conduct risk assessments with SWOT analysis, FMEA, etc. 
  • Develop expertise in risk management strategies. 
  • Utilize frameworks like MITRE ATT&CK to tackle threats. 
  • Develop and implement incident response plans. 
  • Hunt threats with SIEM & Penetration testing. 
  • Utilize honeypot logs and alerts to identify attacker TTPs (Tactics, Techniques, and Procedures).  
  • Develop incident response capabilities to minimize the impact of threats. 

1

Preface

2

Introduction

  • CIA Triad
  • Confidentiality
  • Integrity
  • Availability
  • Conclusion
3

Risk Management

  • Introduction
  • Risk Assessment Scope
  • Analysing Data
  • Risk Mitigation or Acceptance?
  • Case Study: Which Country Is Most Likely to Attack?
  • Conclusion
4

Threats

  • Introduction
  • Mistakes
  • Stealing and Fraud
  • Employee Sabotage
  • Supporting Infrastructure Loss
  • Hacking
  • Espionage (Commercial and Government)
  • Malicious Code (Malware)
  • Scams
  • Case Study: Data Loss in the British Government
  • Conclusion
5

Organisational Responses

  • Introduction
  • The Cybersecurity Strategy
  • Case Study: Monitoring the Underground Economy
  • Conclusion
6

Operational Security: Users

  • Introduction
  • Staffing
  • Managing Users
  • Psychological Factors
  • Modifying User Behaviour
  • Case Study: A Non-Associative Model of Phishing
  • Conclusion
7

Operational Security: Systems

  • Introduction
  • Physical Security
  • Conclusion
8

Operational Security: Threat Response

  • Introduction
  • Situational Crime Prevention
  • Incident Response
  • Disaster Response
  • Conclusion
9

Technical Responses: Securing Systems

  • Introduction
  • Identification and Authentication
  • Authorisation and Access Control
  • Cryptography
  • Steganography
  • Antivirus
  • Conclusion
10

Technical Responses: Forensics

  • Introduction
  • Conclusion
11

Technical Responses: Penetration Testing

  • Introduction
  • Breaking into Your Own Network
  • Breaking Your Own Applications
  • Conclusion
12

Regulatory and Legal Responses

  • Introduction
  • Expert Juries
  • Conclusion
13

Honeypots and Deception

  • Introduction
  • Child Exploitation as a Cybercrime
  • Technical Mechanisms for Warning Message Delivery
  • The Classic Case
  • The Broader Case
  • Legal Issues
  • Conclusion

1

Introduction

  • Simulating the DDoS Attack
  • Creating and Verifying the Digital Signature
2

Threats

  • Exploiting a Website Using SQL Injection
  • Cracking Passwords Using Cain and Abel
  • Performing Social Engineering Attack
  • Examining Spyware
  • Cracking a Linux Password Using John the Ripper
  • Scanning and Classifying Different Types of Viruses
  • Creating a Remote Access Trojan (RAT)
3

Organisational Responses

  • Enforcing Password Policies
4

Operational Security: Systems

  • Identifying Access Badge Areas
  • Implementing Physical Security
5

Technical Responses: Securing Systems

  • Creating File Hashes
  • Understanding SHA Hash Algorithms
  • Changing the Permissions of a File Using the chmod Command
  • Enabling an Access Control List
  • Creating Linux Users and Groups
  • Using Symmetric Encryption
  • Creating Asymmetric Key Pairs
  • Performing Steganography Using OpenStego
  • Installing Antivirus Software
6

Technical Responses: Forensics

  • Converting an NTFS Partition to FAT32 Using Disk Management
7

Technical Responses: Penetration Testing

  • Conducting Vulnerability Scanning Using Nessus
  • Sniffing a Network with Wireshark
  • Performing Nmap Port Scanning
  • Attacking a Website Using XSS Injection
  • Configuring a Network Firewall
8

Honeypots and Deception

  • Setting Up a Honeypot

Any questions?
Check out the FAQs

Want more info about cybersecurity training? Keep reading: 

Contact Us Now

Criminal or illegal activities on computer networks & systems to exploit technologies with a malicious purpose are considered cybercrime. Cybersecurity is the defense mechanism for your system’s health developed to secure your systems against any cybercrime.

The course is designed for: 

  • People seeking skills & jobs in cybersecurity. 
  • Students pursuing Computer Science, IT & other related fields. 
  • Individuals interested in the security of their networks.
  • Professionals aiming for career growth & top spots in cybersecurity & related roles. 

You do not need any experience in cybersecurity before going for this course, however, to work in this field you need a course like this or certifications to validate your combat skills.

Our course is a perfect blend of both hands-on training and theoretical knowledge. You get access to bite-sized lessons as ‘cards’ along with practical training to help you develop real-world skills. Switch between both and create the best opportunities for yourself.

  You can utilize your cybersecurity skills in the following job roles: 

  • Security engineer & architect 
  • Incidents responder
  • Digital forensic investigators
  • Cybersecurity managers
  • Security consultant

You definitely can! Enter the world of security with our cybercrime and cybersecurity course. Gain experience and upskill with certifications such as CompTIA Network + (N10-008), CompTIA Security+ (SY0-701) & CompTIA A+ Core 1(220-1101) & Core 2 (220-1102) to get promoted to higher-paying roles and create a secure career in cybersecurity.

Related Courses

All Course
scroll to top