Complete in under
Become a cyber defender
The Cyber pathway teaches in-demand skills for one of the largest and fastest growing industries in the world.
Regardless of whether your background is technical or not, the pathway is designed to help you apply your existing knowledge to developing skills in the cyber security world.
Duration: 8-12 hrs
This course provides an overview of the introductory topics for basic networking and is designed to teach you how computer networks operate, from a small local area network through to the wider internet.
Delve into the purpose of networks and how we benefit from these technologies, understand network address structures of IPv4 and IPv6 and common hardware like switches, routers and cabling. Plus, learn other essential parts that make networks work including the OSI model, common network services, wireless networks and more.
Duration: 20 hrs
WYWM’s Linux Fundamentals course is catered for those who have no prior knowledge or experience with Linux.
You don’t have to be a programmer, or even know how to write code. The concepts and skills you will learn throughout this course will give you an understanding of Linux’s power, as well as its simplicity.
Duration: 4-6 hrs
As an introduction to OSINT (Open Source Intelligence), this course is designed to educate students on the impact publicly available information can have on individuals and organisations.
This course provides an understanding of how to implement technical requirements for the defensive and offensive protection of a computer network.
You can browse, watch and read the content at your own pace, however, as this course is accredited by the ANSI National Accreditation Board (ANAB) and the United Kingdom's National Cyber Security Centre (NCSC), your progress will be monitored by an instructor and you will need to complete timetabled assessment tasks in order to receive a completion certificate.
The Blue Team Essentials course teaches students the fundamentals of cyber security theory and computer network defence plus the elements that contribute to defensive operations. Students will gain a basic understanding of defensive tools, techniques and procedures from a theoretical perspective then apply their knowledge to hands-on examples.
In this course, you will learn how to:
Duration: 10 hrs
Prerequisites: Red Team Essentials
In this course, you will learn how to use Immunity Debugger, Mona Modules and msfvenom to create fully developed buffer overflow exploits in Python2 and Python3 for the Windows platform.
We will also cover common issues encountered and how to resolve them.
Duration: 3 hrs
This course is designed to give you a basic understanding of cyber security.
It will guide you through what information security is and some of the key points you need to be aware of as you navigate the digital world.
Duration: 2.5 hrs
This course will teach you how to identify phishing attacks, business email compromise attacks, phone scams, vishing attacks and malware. Plus, understand how best to handle these incidents and how to avoid further attacks.