Introduction to Cyber Security
Cyber Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services. This introductory certification course is the fastest way to get up to speed in information security. A balanced mix of technical topics explained in easy-to-understand ways makes this course appealing to attendees who need to understand the important facets of cyber security. (Online Classes available)Course Key Learnings:
- Communicate with confidence regarding information security topics, terms, and concepts
- Understand and apply the Principles of Least Privilege
- Understand and apply the Confidentiality, Integrity, and Availability (CIA) for prioritization of critical security resources
- Build better passwords that are more secure while also being easier to remember and type
- Grasp basic cryptographic principles, processes, procedures, and applications
- Understand how a computer works
- Understand computer network basics
- Have a fundamental grasp of any number of technical acronyms: TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS, and the list goes on.
- Utilize built-in Windows tools to see your network settings
- Recognize and be able to discuss various security technologies, including anti-malware, firewalls, intrusion detection systems, sniffers, ethical hacking, active defense, and threat hunting.
- Understand wireless technologies including WiFi, Bluetooth, mobile phones and the Internet of Things (IoT)
- Explain a variety of frequent attacks such as social engineering, drive-by downloads, watering hole attacks, lateral movement, and other attacks
- Understand different types of malware
- Understand browser security and the privacy issues associated with web browsing
- Explain system hardening
- Discuss system patching
- Understand virtual machines and cloud computing
- Understand backups and create a backup plan for your personal life that virtually guarantees you never have to pay ransom to access your data
Course Content: Module1: Security’s Foundation
- Learn the fundamentals
- Instilling familiarity with core security terms and principles
- Understand the Principle of Least Privilege and why it drives all security decisions
- Know about the Confidentiality, Integrity, and Availability (CIA) method of prioritizing your security program
- Understand the fundamentals of risk management, security policy, and authentication/authorization/accountability (AAA)
- Lab: Introducing the lab environment
- Lab: Building Better
Module2: Computer Function and Networking
- Basic knowledge of how they work
- To work in cyber security, you have to understand the valid functions to understand the potential for invalid misuse
- Cover the difference between the hard drive and Random Access Memory (RAM
- Compare, and contrast the Transmission Control Protocol (TCP)User Datagram Protocol (UDP
- Dynamic Host Control Protocol (DHCP)
- Domain Name System (DNS)
- Network Address Translation (NAT)
- Lab: Computer Number Conversions
- Lab: Networking
Module3:An Introduction to Cryptography
-
- Explain what steganography is
- Covered the “work factor” – the length of time necessary to break cryptography
- Covered hashing, symmetric & asymmetric cryptography and how each works
- Covered email encryption, secure remote administration, secure file transfer
- Lab: Crypto by Hand
- Lab: Visual Crypto
Module4:Cyber Security Technologies- Part- 1
-
- Compare and contrast the security models of Apple’s iPhone and Google’s Android phones
- What is ransomware, and what is Cryptojacking
- What is a virus versus a worm or a trojan horse
- Covered both anti-malware and host firewalls that try to counter these problems
- Lab: Configure a Wireless Access Point (A.K.A. Wireless Router)
- Lab: Run the anti-malware scanner “Malwarebytes”
Module5:Cyber Security Technologies- Part- 2
1.Discussion of Cyber Security Technologies
2.Talk about the browser and Web security, and the difficulties of securing the web environment
3. Lab: Firewall Configuration with Firewall Builder
Module6: Wireless Security, Network Attacks, & Malware
1.Wireless Access Point Configuration 2.Port Scanning with Zenmap 3.Malware Scanning with MalwarebytesInternational Student Fee: 500 US$
Who should attend?
- People who are new to information security and in need of an introduction to the fundamentals of security
- Those who feel bombarded with complex technical security terms they don’t understand but want to understand
- Professionals who need to be conversant in basic security concepts, principles, and terms, but who don’t need “deep in the weeds” detail
- Those who have decided to make a career change to take advantage of the job opportunities in information security and need formal training/certification
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
Stay connected even when you’re apart
Join our WhatsApp Channel – Get discount offers
500+ Free Certification Exam Practice Question and Answers
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities Join Internships and Referral Program (click for details) Work as Freelancer or Full-Time Employee (click for details) Hire an Intern
Internships, Freelance and Full-Time Work opportunities Join Internships and Referral Program (click for details) Work as Freelancer or Full-Time Employee (click for details) Hire an Intern
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
Leadership Essentials -Security Leadership Essentials for Managers