Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
INTRODUCTION TO CYBERSECURITY
- Overview
- Digital Identity and OSINT (Open-Source Intelligence)
- Information Security
- Element Information Security Principles (Confidentiality, Integrity, Availability, Authentication, and Non-repudiation)
- Why and How Hackers Attack? (Motive --> Objective --> Method --> Vulnerability) and Types of Attacks
- Cybersecurity Attack Chain (Cybersecurity Kill Chain) and Methodology and TTPs (Techniques, Tactics, and Procedures)
- Ensuring Information Security (IA - Information Assurance)
- Risk Management and Incident Handling
- Summary (including laws and reports)
CYBERSECURITY FUNDAMENTALS
- Network Basics
- Network Protocols, Ports, and OSI Model
- Practice Time
- Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System), and IPS (Intrusion Prevention System)
- Data Encryption (why it's needed? basics, system-based, file-based, hash functions, PGP methods)
- Backups
- Passwords (including password management)
- Practice and Demonstration
CYBERSECURITY TOOLS
- Social Engineering (Phishing, Vishing, and others)
- Virtualization and Understanding Risks Associated with Virtualization
- Fundamentals of Linux
- Basic Penetration Testing Tools
- Demonstrating and Practicing Penetration Testing and Reporting
- Summary
21 Hours
Testimonials (1)
A variety of thematic areas, as well as a display of curiosities, equipment and drawing attention to seemingly less important elements.
Kamil - Komenda Glowna Strazy Granicznej
Course - Bezpieczeństwo IT - wprowadzenie
Machine Translated