Certificate in IT Security – ECDL

[ BACK UP ]

Course Aims

  • To promote, train and certify participants’ competence in applying best practice in IT security.
  • Protect against hacking and theft, and evaluate security products and solutions.
  • Protect a computer, device or network from viruses and other malware, and guard against fraud and theft.
  • Develop an effective security strategy to prevent unauthorised access to devices and data.
  • Follow best practice for backing up and restoring sensitive data, and securely dispose of data and devices.
  • Evaluate software, firewalls and other solutions to maximise home and workplace security.

Course Content
On completion of this course the candidate will:

  • Security Concepts:  Understand and identify the main concepts underlying the secure use of ICT in daily life including protection against data threats, cybercrime, hacking, unauthorised access to business & personal data, personal security, identity theft, social engineering, file security, macros, encryption, etc.
  • Malware:  Explain the term malware and how it can be concealed, types of infectious malware, types of data theft, protection measures, anti-virus software and its limitations. 
  • Network Security:  Outline the types of network, connection options and their security implications.  Explain the role of the network administrator.  Understand the functions of a firewall and use relevant techniques and applications to maintain a secure wireless network connection.  Understand network access control procedures. 
  • Secure Web Use:  Understand the issues relating to safe web browsing, including purchasing and financial transactions.  Be aware of issues in relation to pharming, digital certificates, one-time passwords, completing on-line forms, cookies. Delete private data from a browser and use content control software. 
  • Social Networking:  Understand the importance of not disclosing confidential information, apply appropriate social networking account privacy settings.  Understand potential dangers from cyber bullying, grooming, dangerous information, false identities, fraudulent links, etc. 
  • Communications:   Understand and apply email security measures, e.g., encryption, digital signature.  Understand concepts and dangers in relation to phishing.  Understand the concept of instant messaging, related security vulnerabilities and confidentiality measures. 
  • Secure Data Management:  Understand how to ensure physical security of devices and best practice for data back-up and restore procedures.  Securely dispose of data and devices, using a range of methods to permanently delete or destroy data.

Entry Requirements
Participants should have general knowledge of information technology applications.

Duration/Start
October, Tuesday, 7pm – 10pm, 8 weeks.

Fee
€295   Exam fees not included

Powered by Netfirms