Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
INTRODUCTION TO CYBER SECURITY
- overview
- Digital identity and OSINT (Open Sources of Information)
- Information Safety
- Elementy information security (Confidentiality, Integrity, Availability, Authentication and Irrefutability)
- Why and how do hackers attack? (Theme --> Target --> Method --> Vulnerability) and Attack Classes
- Cybersecurity Kill Chain and Methodology and TTPs (Techniques, Tactics and Procedures)
- Information Assurance (IA)
- Risk Management and Incident Handling
- Summary (including laws and reports)
CYBER SECURITY BASICS
- Network basics
- Network protocols, ports, OSI model
- Practice time
- Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)
- Data encryption (why is it needed? basics, system-based, file-based, hash functions, PGP methods)
- Backups
- Passwords (including password management)
- Practice and Demonstration
CYBERSECURITY TOOLS
- Social Engineering (Phishing, Vishing and others)
- Virtualization and Understanding the Risks of Virtualization
- Basics Linuxa
- Basic penetration testing tools
- Penetration testing demonstration and practice and reporting
- Summary
21 Hours
Testimonials (1)
A variety of thematic areas, as well as a display of curiosities, equipment and drawing attention to seemingly less important elements.
Kamil - Komenda Glowna Strazy Granicznej
Course - Bezpieczeństwo IT - wprowadzenie
Machine Translated