Course Outline

INTRODUCTION TO CYBERSECURITY

  1. Overview
  2. Digital Identity and OSINT (Open Source Intelligence)
  3. Information Security
  4. Elements of Information Security (Confidentiality, Integrity, Availability, Authentication, and Non-repudiation)
  5. Why and How Hackers Attack? (Motivation --> Goal --> Method --> Vulnerability) and Classes of Attacks
  6. Cybersecurity Attack Chain (CyberSecurity Kill Chain) and Methodology as well as TTPs (Techniques, Tactics, and Procedures)
  7. Ensuring Information Security (IA - Information Assurance)
  8. Risk Management and Incident Handling
  9. Summary (including laws and reports)

FUNDAMENTALS OF CYBERSECURITY

  1. Network Basics
  2. Networking Protocols, Ports, OSI Model
  3. Practical Time
  4. Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)
  5. Data Encryption (why is it needed? basics, system-based, file-based, hash functions, PGP methods)
  6. Backups
  7. Passwords (including password management)
  8. Practice and Demonstration

CYBERSECURITY TOOLS

  1. Social Engineering (Phishing, Vishing, and others)
  2. Virtualization and Understanding Virtualization Risks
  3. Linux Basics
  4. Basic Penetration Testing Tools
  5. Demonstrating and Practicing Penetration Testing as well as Reporting
  6. Summary
 21 Hours

Number of participants


Price Per Participant (Exc. Tax)

Testimonials (1)

Provisional Courses

Related Categories