We use cookies to ensure you get the best experience on our website. Please review our cookie policy for details.

Cybercrime and Cybersecurity

Not all heroes wear capes, some enroll in uCertify’s cybersecurity course to tackle monsters on the web!

(CYBERCRIME.AV1) / ISBN : 978-1-64459-597-8
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Do you aspire to become a cybersecurity expert? 

Then, our Cybercrime and Cybersecurity Course is made for you! 

We help you develop the hands-on skills required to defend your systems from any cyberattack with 10+ interactive lessons & 100+ practice exercises.   Convert your lessons into actions with our hands-on LABs, designed to help you gain real-world experience for better opportunities & experience. 

Take the first step towards your secure career by omitting cybercrime & inviting exciting opportunities, enroll now! 

Skills You’ll Get

  • Recognize & distinguish between Internal, External, Natural & Advanced threats. 
  • Conduct risk assessments with SWOT analysis, FMEA, etc. 
  • Develop expertise in risk management strategies. 
  • Utilize frameworks like MITRE ATT&CK to tackle threats. 
  • Develop and implement incident response plans. 
  • Hunt threats with SIEM & Penetration testing. 
  • Utilize honeypot logs and alerts to identify attacker TTPs (Tactics, Techniques, and Procedures).  
  • Develop incident response capabilities to minimize the impact of threats. 

1

Preface

2

Introduction

  • CIA Triad
  • Confidentiality
  • Integrity
  • Availability
  • Conclusion
3

Risk Management

  • Introduction
  • Risk Assessment Scope
  • Analysing Data
  • Risk Mitigation or Acceptance?
  • Case Study: Which Country Is Most Likely to Attack?
  • Conclusion
4

Threats

  • Introduction
  • Mistakes
  • Stealing and Fraud
  • Employee Sabotage
  • Supporting Infrastructure Loss
  • Hacking
  • Espionage (Commercial and Government)
  • Malicious Code (Malware)
  • Scams
  • Case Study: Data Loss in the British Government
  • Conclusion
5

Organisational Responses

  • Introduction
  • The Cybersecurity Strategy
  • Case Study: Monitoring the Underground Economy
  • Conclusion
6

Operational Security: Users

  • Introduction
  • Staffing
  • Managing Users
  • Psychological Factors
  • Modifying User Behaviour
  • Case Study: A Non-Associative Model of Phishing
  • Conclusion
7

Operational Security: Systems

  • Introduction
  • Physical Security
  • Conclusion
8

Operational Security: Threat Response

  • Introduction
  • Situational Crime Prevention
  • Incident Response
  • Disaster Response
  • Conclusion
9

Technical Responses: Securing Systems

  • Introduction
  • Identification and Authentication
  • Authorisation and Access Control
  • Cryptography
  • Steganography
  • Antivirus
  • Conclusion
10

Technical Responses: Forensics

  • Introduction
  • Conclusion
11

Technical Responses: Penetration Testing

  • Introduction
  • Breaking into Your Own Network
  • Breaking Your Own Applications
  • Conclusion
12

Regulatory and Legal Responses

  • Introduction
  • Expert Juries
  • Conclusion
13

Honeypots and Deception

  • Introduction
  • Child Exploitation as a Cybercrime
  • Technical Mechanisms for Warning Message Delivery
  • The Classic Case
  • The Broader Case
  • Legal Issues
  • Conclusion

1

Introduction

  • Creating and Verifying the Digital Signature
  • Simulating the DDoS Attack
2

Threats

  • Exploiting a Website Using SQL Injection
  • Performing Social Engineering Attack
  • Cracking Passwords Using Cain and Abel
  • Examining Spyware
  • Cracking a Linux Password Using John the Ripper
  • Creating a Remote Access Trojan (RAT)
  • Scanning and Classifying Different Types of Viruses
3

Organisational Responses

  • Enforcing Password Policies
4

Operational Security: Systems

  • Identifying Access Badge Areas
  • Implementing Physical Security
5

Technical Responses: Securing Systems

  • Creating File Hashes
  • Understanding SHA Hash Algorithms
  • Changing the Permissions of a File Using the chmod Command
  • Enabling an Access Control List
  • Creating Linux Users and Groups
  • Using Symmetric Encryption
  • Creating Asymmetric Key Pairs
  • Performing Steganography Using OpenStego
  • Installing Antivirus Software
6

Technical Responses: Forensics

  • Converting an NTFS Partition to FAT32 Using Disk Management
7

Technical Responses: Penetration Testing

  • Configuring a Network Firewall
  • Performing Nmap Port Scanning
  • Sniffing a Network with Wireshark
  • Conducting Vulnerability Scanning Using Nessus
  • Attacking a Website Using XSS Injection
8

Honeypots and Deception

  • Setting Up a Honeypot

Any questions?
Check out the FAQs

Want more info about cybersecurity training? Keep reading: 

Contact Us Now

Criminal or illegal activities on computer networks & systems to exploit technologies with a malicious purpose are considered cybercrime. Cybersecurity is the defense mechanism for your system’s health developed to secure your systems against any cybercrime.

The course is designed for: 

  • People seeking skills & jobs in cybersecurity. 
  • Students pursuing Computer Science, IT & other related fields. 
  • Individuals interested in the security of their networks.
  • Professionals aiming for career growth & top spots in cybersecurity & related roles. 

You do not need any experience in cybersecurity before going for this course, however, to work in this field you need a course like this or certifications to validate your combat skills.

Our course is a perfect blend of both hands-on training and theoretical knowledge. You get access to bite-sized lessons as ‘cards’ along with practical training to help you develop real-world skills. Switch between both and create the best opportunities for yourself.

  You can utilize your cybersecurity skills in the following job roles: 

  • Security engineer & architect 
  • Incidents responder
  • Digital forensic investigators
  • Cybersecurity managers
  • Security consultant

You definitely can! Enter the world of security with our cybercrime and cybersecurity course. Gain experience and upskill with certifications such as CompTIA Network + (N10-008), CompTIA Security+ (SY0-701) & CompTIA A+ Core 1(220-1101) & Core 2 (220-1102) to get promoted to higher-paying roles and create a secure career in cybersecurity.

Related Courses

All Course
scroll to top