Shaw Academy

Your Future, Your Way!

Course Catalogue

Get 4 Weeks FreeLogin


All Levels


Most of this week’s places have been filled.

Start your course now to guarantee your place.


What you'll learn

  • Understand how information is sent in a wide area network
  • Understand how malware affects your devices and how to identify threats in a network
  • How to monitor and mitigate risk
  • How to use analytics to build user-centric behavioural patterns
  • History of the NIST Framework

Course Content

module 1

Diploma in Cybersecurity




  1. Exploring the Fundamentals of Networking

    In this lesson, you will explore the fundamentals of networking. You will look at network topology, how data is created, the OSI -TCP/IP stack, identifying different devices in a network, and understanding how different networks create the internet.

  2. Setting Up a Small Network

    Identify hardware required for creating a network before diving into a practical demonstration on creation of traffic (data) on devices and transferring it to the ISP (internet service provider).

  3. Concept of a Wi-Fi or Wireless Network

    Explore wireless routers and access points, and how they operate. Manage an on-premise access points and understand cloud-managed access points, and the benefits of using them. This lesson takes an in-depth look at how devices are connected wirelessly, the capabilities of networking, and how a wireless network adaptor works.

  4. Types of Wireless Access Points

    This lesson will provide you with a solid understanding of the different types of wireless networks, which are WAN (Wide Area Networks), LAN (Local Area Networks), and PAN ( Personal Area Network).

  5. Logical Addressing

    This lesson delves into the concept of logical addressing, how CPU generates the logical address, and how to map the logcal address with the memory-management unit to its corresponding physical address.

  6. Benefits of a Wi-Fi Wireless Network

    Understand the benefits, convenience and differences of the internet, intranet, and extranet. This lesson also looks at how these can increase productivity in an enterpise network. Explore Network File Sharing over a wireless network, and lastly, see how encrypted information (traffic) is sent over the extranet network.

  7. Design and Deployment of Enterprise Wireless

    This lesson explores the architecture of centralised deployment, converged deployment and cloud-based deployment. Learn how to set these up and understand the differences when applied in an enterprise network.

  8. Implementing Security on a Wireless and Wired Network

    The final lesson in module one looks at attacks on WLANs, and how to use wireless protocol analysers for emerging security solutions.

module 2

Intermediate in Cybersecurity



  1. Identifying the Need for Security

    What are network security threats, and what is the discrepancy between active and passive attacks? Today's lesson is about identifying the need for security. We will look at network vulnerabilities, the difference between threats, malware, vulnerability and risks, and discover ways to identify network security threats.

  2. Securing Devices

    We've all heard that passwords like "123456" or "P@ssword" are the worst things to choose when protecting ourselves online. What exactly are the advantages of passwords and biometric security? Why do we use antivirus software? This lesson answers those questions plus explores blocking ads and enhancing software features with the lates security patches.

  3. Risk of Network Attacks

    Do you know the risks of network attacks? After this lesson, you understand common network security risks, the scale and impact of industrial espionage, and network disruption and resilience.

  4. Identify and Mitigate Network Attacks

    Understand the theory behind "network cloaking" and how it can mitigate risk, the Intrusion Prevention System (IPS) and how it works, and protecting a network with security "onion" and "artichoke" approaches.

  5. Securing Managing Wireless Devices

    Learn how to implement security on a wireless network, use cloud-based tools to manage a network, and minimise the risks to your wireless network.

  6. Securing Web, Email and Social Networking

    In this lesson, you will know how creating security awareness for employees helps reduce risk in the workplace. You'll understand why businesses need security awareness training, and the importance of encrypting sensitive data.

  7. Applying Physical Security on Devices

    Apply password-protect and understand the benefits of its use on your device, backup data using cloud services, and the different tracking software processes on mac/Linux/windows.

  8. Protecting Your Data

    There are countless videos and documentaries online about the impact of social media on personal information and behaviours, yet there are still hundreds of millions of people logging in and checking their phones multiple times a day without protecting themselves. From a security perspective, we all need to learn the dangers that lurk on social media. Understand how social media could be used to gather intelligence on you by hackers, explore phishing emails and learn how to identify an authentic WiFi network.

module 3

Advanced in Cybersecurity



  1. Introduction to Network Security

    Learn the different types of network attacks and prevention techniques, analyse data (traffic) on a network using Wireshark and network miner, and restrict and monitor access to your network and data.

  2. Firewalls and VPN

    Carrying over from our previous lesson, we will explore data using Wireshark in more detail, verify encryption of VPNs on the network, and how to set up a defence mechanism.

  3. Anti-virus and Anti-malware Software

    Learn how to identify a threat in a system using anti-malware, use Artificial Intelligence and Machine Learning in real-time protection and on-demand scanning, and apply malware protection and best practices.

  4. Network Segmentation/Intrusion Prevention Systems

    This lesson will explore network segmentation, security considerations when implementing segmentation, and ways to improve the performance of a network.

  5. Access Control

    By the end of this lesson, you will understand access control and its common types - Role-based Access Control (RBAC), Discretionary Access Control (DAC) and Mandatory Access Control (MAC).

  6. Application Security

    This lesson serves as an introduction to Authentication, Authorization, and Accounting (AAA). We'll explore its benefits in application security, how it is applied, and the role of encryption within it.

  7. Behavioural Analytics

    This lesson gives you an introduction to data analytics, including how to use analytics to build user-centric behavioral patterns. We'll explore the benefits of behavioural analytics, particularly with Artificial Intelligence and Machine Learning.

  8. Data Loss Prevention/Event Management

    After this lesson you'll know what data loss prevention (DLP) is and its main objectives, followed by best practices.

module 4

Proficient in Cybersecurity



  1. History of the NIST Framework

    Kick off our final module with identifying the incentive that led to the invention of the NIST Framework, which involved a public-private collaboration. As it is important to stay up to date, we will go through the continuous development projects in the Framework.

  2. Understanding the Structure of the Framework Component

    Understand the information cybersecurity framework, and the structure of the NIST Framework. We'll also explore why companies adopt the latest technology trends.

  3. Exploring the NIST Cybersecurity Framework and its Components

    The objective of this lesson is to understand the three main components of the NIST Framework, namely, the core, implementation tiers, and profiles.

  4. Aims of the Framework

    In this lesson, we'll standardise an unbiased cybersecurity framework, and understand the use of a durable cybersecurity framework. We'll also explore future regulation and compliance requirements, and the framework's flexibility.

  5. Implementation and Benefits

    In this lesson, we'll define quantifiable goals and commit to those goals. We'll identify and manage privacy risk in a business, and apply existing standards, guidelines, and practices to mitigate risk.

  6. Functions of the Framework

    This lesson will explore the five functions of a framework: identify, protect, detect, respond and recover.

  7. Implementation of Risk Management on an Asset Using the NIST Framework

    Manage information-system related security and privacy, understand how experienced representatives provide goals for an organisation, and learn about the planning, execution, and management of a project in development.

  8. Decision-making and Implementing the Framework

    Choosing the committee involved in decision making is an important task — you need to assess the committee, choose the administrator of the intervention, select a specialised advisory group and a community consulation committee. After today's lesson you will know exactly how to go about this process.

Certified by
Globally recognised by
  • Weeks
    16 Weeks


  • lessons
    32 Lessons

    Plus assessments

  • modules
    4 Modules


  • course
    Globally Recognised


Avg. Rating



ust had my first lesson for web development and its been fantastic. As it was the first lesson, it was an hour and a half long but it flew by!! Absolutely wonderful.


I barley write reviews but I have taken the introduction to Web Development Course and wouldn't hesitate to recommend this site to anyone. I cant belive the support they offer, they are very quick to respond and its no different to attending a college.


hey guys, completed my diploma in Web development course with a score of 93% on my final assignment!.JULIAN QUIRKE(educator) made us spellbound with every session and love the way he teaches and GUYS give that man a 'MEDAL' haha!!.


I recommend anyone to take Shaw academy courses.currently doing web development I have not been able to join any webinar sessions but the recordings are awesome.


Very excited about the mobile Web development course I started this week. The first lesson was awesome!

You might also like

Course Benefits

Flexible online classes
You pick the schedule.
Pause course
Take a break any time.
Educator support
Always get your answers.
Offline mode
Download class recordings.
Globally Recognised Courses
International focus to curriculum.
One plan - All content.

Start building your future, your way.

Access to all 100+ courses including:
  • Live educator chat support
  • 20+ hours of learning per course
  • Exams & continuous assessments
  • Unique lessons curated by in-house experts
  • Lifetime access to all lessons
  • Globally accredited certifications

$49.99 / month

FREE for 4 weeks

Start your free course

No commitment

FREE for 4 weeks

No Commitment