• Instructor-led Classroom-based & Live Virtual Online Training
  • Hands-on Training
  • Free Study Material
  • Lab Exercises
  • Unlimited Lab Access
  • 100 % Passing Guarantee or Free Re-training



  • Fast Track
    Days: Monday-Friday
    Duration: 5 days
  • Slow Track
    Days: Saturdays / Sundays / Evenings
    Duration: 5 Weeks

Study Modes:

  • Classroom / On-site
  • Live Virtual


For More information call us on

0208 123 7574


This certificate course is designed for the IT professionals who are in charge of managing, monitoring and configuring the IT security issues of the organization. In this course, you will get a comprehensive understanding of the basics of Cyber Security, which include:

  • Concepts of Cyber Security
  • The architecture of Cyber Security
  • Managing the Security Risk
  • Implementing proper security measures
  • Introducing with Cryptocurrency
  • Develop recovery planning for disaster recovery
  • Develop effective planning for business continuity

In this course, you will also learn how to develop and maintain an asset register. Gradually, you will also be able to identify the threats, assess the risk, and make appropriate recommendations for the security of the IT infrastructure. The subject matter of this course will also allow you to identify the pros and cons of different encryption technologies, as well. After that, you will be able to develop different security assurance approaches and strategies for reducing the IT Security Risk of the organization.



  • This course has no specific prerequisites.
  • It is ideal if you have a fundamental knowledge of Cyber Security, but are not required
  • It is expected that you have a key understanding of the IT Security issues

What will you gain after this course

  • This course will help you to play the key roles to detect, prevent and resolve any kind of Cyber Threats to the IT infrastructure of the organization.
  • You will learn a wide range of issues regarding IT Security management, with the help of this course.
  • You will earn the required knowledge regarding the basics of computer and network security.
  • Upon successful completion of this course, you will be recognized as certified cybersecurity professional.
  • This course will also help you to explore and expand your job opportunity as a Cyber Security Specialist.


  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet
  • Information Security Overview
  • Information Security Services
  • Types of Attacks
  • Goals for Security
  • E-commerce Security
  • Computer Forensics
  • Steganography
  • Security Engineering
  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cyber crime and Cyber terrorism
  • Information Warfare and Surveillance
  • Introduction to Cryptography
  • Symmetric key Cryptography
  • Asymmetric key Cryptography
  • Message Authentication and Hash functions
  • Digital Signatures
  • Public Key infrastructure
  • Diffie-Hellman key exchange protocol
  • Applications of Cryptography
  • Overview of Security Management
  • Information Classification Process
  • Security Policy
  • Risk Management
  • Security Procedures and Guidelines
  • Business Continuity and Disaster Recovery
  • Security Assurance
  • Security Laws
  • International Standards
  • Security Audit
  • OCTAVE approach and SSE-CMM
  • Overview of Identification and Authorization
  • I & A Techniques
  • Overview of IDS
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • Server Management and Firewalls
  • User Management
  • DNS Routing and Load Balancing
  • Overview of Firewalls
  • Types of Firewalls
  • DMZ and firewall features
  • VPN Security
  • Security in Multimedia Networks
  • Fax Security
  • Link Encryption Devices
  • Designing Secure Operating Systems
  • Controls to enforce security services
  • Information flow model and Biba model
  • Desktop Security
  • Email security: PGP and SMIME
  • Web Security: web authentication, SSL and SET
  • OS Security Vulnerabilities, updates and patches
  • OS integrity checks
  • Anti-virus software
  • Design of secure OS and OS hardening
  • Configuring the OS for security
  • Trusted OS

Benefits of a IT Certification from iTraining London

  • Gain a highly recognised, on-demand accreditation of excellence
  • Differentiate yourself in a crowded market
  • Execute tasks with confidence and skills
  • Attain higher wages and billable rates with a highly valued credential

Dates And Prices

Start Date TimingDaysDuration Mode Of TrainingRequest Price/Future Dates
10:00 – 18:00Tuesday-Wednesday 2 DaysClassroom Based / Live Virtual Online
10:00 – 18:00Wednesday-Thursday 2 DaysClassroom Based / Live Virtual Online
10:00 – 18:00Thursday-Friday 2 DaysClassroom Based / Live Virtual Online
10:00 – 18:00Wednesday-Thursday 2 DaysClassroom Based / Live Virtual Online
10:00 – 18:00Tuesday-Wednesday 2 DaysClassroom Based / Live Virtual Online


SAP HCM at iTraining London


Company that offers design and build services for you from initial sketches to the final production.

read more


Our aim is exclusively focused on high-quality training that are tailored to corporate needs. The training delivered by professional trainers.

read more

Comptia A+

Our internship programme is designed to help students who have successfully completed the training and give experience in real time projects.

read more


We allow only a limited number of students in a class. So you get more attention from your instructor and clarify your doubts better.

read more