Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
INTRODUCTION TO CYBERSECURITY
- Overview
- Digital Identity and OSINT (Open Source Intelligence)
- Information Security
- Elements of Information Security (Confidentiality, Integrity, Availability, Authentication, and Non-repudiation)
- Why and How Hackers Attack? (Motivation --> Goal --> Method --> Vulnerability) and Classes of Attacks
- Cybersecurity Attack Chain (CyberSecurity Kill Chain) and Methodology as well as TTPs (Techniques, Tactics, and Procedures)
- Ensuring Information Security (IA - Information Assurance)
- Risk Management and Incident Handling
- Summary (including laws and reports)
FUNDAMENTALS OF CYBERSECURITY
- Network Basics
- Networking Protocols, Ports, OSI Model
- Practical Time
- Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)
- Data Encryption (why is it needed? basics, system-based, file-based, hash functions, PGP methods)
- Backups
- Passwords (including password management)
- Practice and Demonstration
CYBERSECURITY TOOLS
- Social Engineering (Phishing, Vishing, and others)
- Virtualization and Understanding Virtualization Risks
- Linux Basics
- Basic Penetration Testing Tools
- Demonstrating and Practicing Penetration Testing as well as Reporting
- Summary
21 Hours
Testimonials (1)
A variety of thematic areas, as well as a display of curiosities, equipment and drawing attention to seemingly less important elements.
Kamil - Komenda Glowna Strazy Granicznej
Course - Bezpieczeństwo IT - wprowadzenie
Machine Translated