It's Easy to Enrol

Select a Learning Method


£355.00 Payment plans available.

Courses can be started at any time from anywhere in the world!
Please note that if you choose the 'e-learning' (course on USB) method, be aware that due to current covid-19 restrictions there are some countries we can not send USB sticks to.

We recommend you choose the online learning method as all online courses provide access to download course notes to access offline or print. If you do require your course to be supplied on USB stick then please contact us first to check availability for your country.

Cyber Security

Course CodeVIT103
Fee CodeS3
Duration (approx)100 hours
QualificationStatement of Attainment

Learn to Protect all forms of Information Technology

  • Understand Vulnerabilities of Information Technology
  • Secure IT systems
  • Know how to detect issues
  • Understand how to respond and data recovery

Lesson Structure

There are 11 lessons in this course:

  1. Introduction to Cyber Security and cyber attacks/defences
  2. Vulnerability Assessment
  3. Securing the facilities and networks
  4. Securing your online digital footprint
  5. Internet Security and Digital Certificates
  6. Wireless Network Vulnerabilities, Attacks and Security
  7. Firewalls, IDS and IPS
  8. Cryptography
  9. Access Control and Authentication
  10. Cyber attack Disaster Recovery strategies
  11. Ongoing Security Management

Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.


It is crucial for any business to protect a computer network with a well-designed and configured intrusion detection and intrusion prevention systems (IDPS). 


To remain aware of change, and see threats coming, you must cultivate effective networking.
This involves developing contacts with others in the IT and Information industries; and continuing to cultivate those relationships.
Relationships may be developed in various ways:

  • Social Networking
  • Professional Associations
  • One to one relationships with colleagues
  • Relationships with service providers


Maintaining information security requires a certain attitude and if the person responsible does not have an appropriate attitude, they are vulnerable to failure.


Establishing and enforcing operational procedures in an organisation is an important part of ensuring information security is optimised. As with everything else, procedures need to be continually reviewed and changed, in the light of other changes that may impact upon those procedures. For example, when an organisation is small, a procedure for physically copying and storing a backup of information can be relatively simple but as an organisation grows and becomes more complex, or as new threats emerge an old procedure may no longer be the best procedure.

Products and Services

There are various products available that can be used to protect information in one way or another e.g. virus protection software, but you must always recognise the usefulness of a product does not remain stagnant i.e. virus protection must be continually updated to remain effective.Entrepreneurs are always looking for opportunities to supply products or services that fill a need by industry; and every time a new threat emerges to information, there will be people trying to develop solutions to those threats.

The Law

National and international laws can offer a degree of protection, but in today's world, new threats often emerge so often and so quickly that it is next to impossible for a legal solution to be enacted fast enough. If a threat damages your information security on a large enough scale, it can be viable to take legal action against the perpetrator, but this situation is rare. Taking someone to court in your own country is difficult and expensive. Taking them to court across international borders is an even more complex and costly situation.
Despite the problems involved with using the law for information security, laws can be an important deterrent. For that reason, if no other, it is important to keep laws as up to date as possible.

If information security is of significant importance to you it may be important for you to engage with "regulators" and contribute toward their awareness of laws which need updating or adopting.