Course Outline

INTRODUCTION TO CYBER SECURITY

  1. overview
  2. Digital identity and OSINT (Open Sources of Information)
  3. Information Safety
  4. Elementy information security (Confidentiality, Integrity, Availability, Authentication and Irrefutability)
  5. Why and how do hackers attack? (Theme --> Target --> Method --> Vulnerability) and Attack Classes
  6. Cybersecurity Kill Chain and Methodology and TTPs (Techniques, Tactics and Procedures)
  7. Information Assurance (IA)
  8. Risk Management and Incident Handling
  9. Summary (including laws and reports)

CYBER SECURITY BASICS

  1. Network basics
  2. Network protocols, ports, OSI model
  3. Practice time
  4. Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)
  5. Data encryption (why is it needed? basics, system-based, file-based, hash functions, PGP methods)
  6. Backups
  7. Passwords (including password management)
  8. Practice and Demonstration

CYBERSECURITY TOOLS

  1. Social Engineering (Phishing, Vishing and others)
  2. Virtualization and Understanding the Risks of Virtualization
  3. Basics Linuxa
  4. Basic penetration testing tools
  5. Penetration testing demonstration and practice and reporting
  6. Summary
 21 Hours

Number of participants


Price Per Participant (Exc. Tax)

Testimonials (1)

Provisional Courses

Related Categories