Cyber Security Essentials (CSE)

Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase. Cyber Criminals are also increasing in capabilities and taking advantage of the lack of pace in the release of security software patches and updates due to the continuous adoption of new technologies like the Internet of Things (IOT).

COURSE OBJECTIVE

Cyber Security Essentials (CSE) is aimed to provide participants with the fundamental knowledge of Cyber Security and Network Security. Through real-time demonstration on scenario based hands-on exercises, Participants will be able to experience first-hand different types of attacks. Essential concepts on networking and security will also be covered allowing participants to gain in-depth knowledge on Cyber Security.

COURSE DURATION
3 Days

COURSE OUTLINE

Unit 1: Fact about Living in Real World

  • Introduction of Security
    • Facts about Hacking in Real World

Unit 2: Introduction to Ethical Hacking

  • All About Ethical Hacking
    • How We Secure Things by Ethical hacking

Unit 3: Hacking Phases

  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintain Access
  • Clearing Tracks

Unit 4: How to Build a Lab to Hack Safely

  • Precautions to Before to Start Hacking
  • Configure Lab for Hack Safely

Unit 5: Installing and Configuring Your Windows Server VMs

  • Installing Windows Server (Windows Server 2008 / 2012)
  • Installing Linux Server

Unit 6: Installing and Configuring Your Desktop VMs

  • Installing Windows Client OS (Windows 7 / Windows 10)
  • Installing Kali Linux
  • Installing Ubuntu

Unit 7: Information Security Overview

  • Hacking vs Ethical Hacking
  • Fundamentals of Information Security

Unit 8: Security Threats and Attack Vectors

  • Threats Hosts
  • Threats Applications
  • Threats Human
  • Threats Networks
  • Attack Vectors

Unit 9: Hacking Concepts

  • Hacking Overview
  • History of Hacking – From Beginning to Future
  • Types of Hackers
  • Why Hacker Hacks?
  • Impacts of Hacking on Individuals, Society and Businesses

Unit 10: Attack Types

  • Misconfiguration Attacks
  • Shrink-wrap Code Attacks
  • OS Attacks
  • Entry Points for an Attack 5. Application Attacks

Unit 11: What is Security Controls

  • Necessity of Ethical Hacking
  • What Skills You Must Have
  • Incident Management
  • Security Policies
  • Penetration Testing

Examination

Participants are required to pass an examination. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered in the course.

Certification

Participantals (CSE) upon meeting the requirements and passing the examination.

WHO WILL BENEFIT FROM THIS COURSE?

Cyber Security Essentials (CSE) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.

Class is limited to 20 participants as hands-on sessions and real-time demonstration is expected.

Price: $1 495 plus taxes.

REGISTER