Cyber Security Essentials (CSE)
Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase. Cyber Criminals are also increasing in capabilities and taking advantage of the lack of pace in the release of security software patches and updates due to the continuous adoption of new technologies like the Internet of Things (IOT).
Cyber Security Essentials (CSE) is aimed to provide participants with the fundamental knowledge of Cyber Security and Network Security. Through real-time demonstration on scenario based hands-on exercises, Participants will be able to experience first-hand different types of attacks. Essential concepts on networking and security will also be covered allowing participants to gain in-depth knowledge on Cyber Security.
Unit 1: Fact about Living in Real World
- Introduction of Security
- Facts about Hacking in Real World
Unit 2: Introduction to Ethical Hacking
- All About Ethical Hacking
- How We Secure Things by Ethical hacking
Unit 3: Hacking Phases
- Gaining Access
- Maintain Access
- Clearing Tracks
Unit 4: How to Build a Lab to Hack Safely
- Precautions to Before to Start Hacking
- Configure Lab for Hack Safely
Unit 5: Installing and Configuring Your Windows Server VMs
- Installing Windows Server (Windows Server 2008 / 2012)
- Installing Linux Server
Unit 6: Installing and Configuring Your Desktop VMs
- Installing Windows Client OS (Windows 7 / Windows 10)
- Installing Kali Linux
- Installing Ubuntu
Unit 7: Information Security Overview
- Hacking vs Ethical Hacking
- Fundamentals of Information Security
Unit 8: Security Threats and Attack Vectors
- Threats Hosts
- Threats Applications
- Threats Human
- Threats Networks
- Attack Vectors
Unit 9: Hacking Concepts
- Hacking Overview
- History of Hacking – From Beginning to Future
- Types of Hackers
- Why Hacker Hacks?
- Impacts of Hacking on Individuals, Society and Businesses
Unit 10: Attack Types
- Misconfiguration Attacks
- Shrink-wrap Code Attacks
- OS Attacks
- Entry Points for an Attack 5. Application Attacks
Unit 11: What is Security Controls
- Necessity of Ethical Hacking
- What Skills You Must Have
- Incident Management
- Security Policies
- Penetration Testing
Participants are required to pass an examination. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered in the course.
Participantals (CSE) upon meeting the requirements and passing the examination.
WHO WILL BENEFIT FROM THIS COURSE?
Cyber Security Essentials (CSE) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.
Class is limited to 20 participants as hands-on sessions and real-time demonstration is expected.
Price: $1 495 plus taxes.REGISTER