Course Outline

INTRODUCTION TO CYBERSECURITY

  1. Overview
  2. Digital Identity and OSINT (Open-Source Intelligence)
  3. Information Security
  4. Element Information Security Principles (Confidentiality, Integrity, Availability, Authentication, and Non-repudiation)
  5. Why and How Hackers Attack? (Motive --> Objective --> Method --> Vulnerability) and Types of Attacks
  6. Cybersecurity Attack Chain (Cybersecurity Kill Chain) and Methodology and TTPs (Techniques, Tactics, and Procedures)
  7. Ensuring Information Security (IA - Information Assurance)
  8. Risk Management and Incident Handling
  9. Summary (including laws and reports)

CYBERSECURITY FUNDAMENTALS

  1. Network Basics
  2. Network Protocols, Ports, and OSI Model
  3. Practice Time
  4. Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System), and IPS (Intrusion Prevention System)
  5. Data Encryption (why it's needed? basics, system-based, file-based, hash functions, PGP methods)
  6. Backups
  7. Passwords (including password management)
  8. Practice and Demonstration

CYBERSECURITY TOOLS

  1. Social Engineering (Phishing, Vishing, and others)
  2. Virtualization and Understanding Risks Associated with Virtualization
  3. Fundamentals of Linux
  4. Basic Penetration Testing Tools
  5. Demonstrating and Practicing Penetration Testing and Reporting
  6. Summary
 21 Hours

Number of participants


Price Per Participant (Exc. Tax)

Testimonials (1)

Provisional Courses

Related Categories