Course Outline
INTRODUCTION TO CYBERSECURITY 1. Overview 2. Digital Identity & OSINT 3. Information Security 4. Elements of Information Security (Confidentiality, Integrity, Availability, Authentication and Non repudiation. 5. Why and how Hackers Attack? (Motive -->Goal -->Method -->Vulnerability) & Classes of Attacks 6. CyberSecurity Kill Chain & Methodology & TTPs 7. Information Assurance (IA) 8. Risk Managment & Incident Handling 9. Summary (incl. laws&reports
CYBERSECURITY FUNDAMENTALS 1. Networking basics 2. Network protocols, ports, OSI model. 3. Practice time 4. Firewalls, DMZ, IDS & IPS 5. Data encryption (why do we need it? basic, system based, file based, hashes, PGP methods) 6. Backups 7. Passwords (including password management) 8. Practice & Demonstration
CYBERSECURITY TOOLS 1. Social Engineering (Phishing, Vishing, and more) 2. Virtualization & Knowledge of risk associated with virtualizations 2. Basic Linux 4. Basic Pentesting Tools 5. Pentest demo & practice & reports 6. Summary
Testimonials (1)
A variety of thematic areas, as well as a display of curiosities, equipment and drawing attention to seemingly less important elements.
Kamil - Komenda Główna Straży Granicznej
Course - Bezpieczeństwo IT - wprowadzenie
Machine Translated