Introduction to Cyber Security Training
Introduction to Cyber Security Training Course – Hands-on
Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!
This comprehensive five-day Introduction to Cyber Security Training course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.
The hands-on, step-by-step learning format will enable you to grasp all the information presented even if some of the topics are new to you. You’ll learn the fundamentals of cyber security that will serve as the foundation of your security skills and knowledge for years to come.
With billions of devices now online, new threats pop up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and on social media, this Introduction to Cyber Security Training course is the answer.
It explores cyber trends, and threats—along with the broader topic of cybersecurity in a way that will matter to you. For instance, you’ll learn how to protect your personal privacy online while gaining additional insight on the challenges companies, and governmental and educational institutions face today. No prerequisites are required.
Why take this Introduction to Cyber Security Training course?
• The Introduction to Cyber Security Training course lives up to its name as a thorough introduction to cyber security. The course is designed for those who have a limited background in information technology, but who need to understand cyber security concepts, principles, and terms. If you fall into that category, Introduction to Cyber Security Training will serve your needs well.
What’s Included?
- 5 days of Introduction to Cyber Security Training with an expert instructor
- Introduction to Cyber Security Training Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
Resources
- Introduction to Cyber Security Training – https://www.wiley.com/
- Introduction to Cyber Security Training – https://www.packtpub.com/
- Introduction to Cyber Security Training – https://store.logicaloperations.com/
- Introduction to Cyber Security Training – https://us.artechhouse.com/
- Introduction to Cyber Security Training – https://www.amazon.com/
Related Courses
Customize It:
- We can adapt this Introduction to Cyber Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Introduction to Cyber Security course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Introduction to Cyber Security Training Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Introduction to Cyber Security course in a manner understandable to lay audiences.
Audience / Target Group:
The target audience for this Introduction to Cyber Security Training course:
- Network professionals looking to advance their knowledge and explore cybersecurity as a career path
- Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level
- Individuals want to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities
Prerequisites:
The knowledge and skills that a learner must have before attending this Introduction to Cyber Security course are as follows:
- Understanding Networking Fundamentals
- TCP/IP Networking
- Introduction to CyberSecurity assumes basic knowledge of computers and technology
- Introduction to CyberSecurity makes no assumptions regarding prior security knowledge
Introduction to Cyber Security – Objectives:
After completing this Introduction to Cyber Security course, students will be able to:
- Increase your awareness of security
- Interpret/analyze tool output for network mapping/footprinting
- Reduce attack surface of systems
- Review networking as it applies to security controls
- Explore different data protection principles
- Examine the role of PKI/certificates in building trusted relationships between devices in a network
- Implement login security and other identity management solutions
- Reduce attack surface of network devices
- Explore current malware threats and anti-malware solutions
- Explore social engineering threats, methods, and techniques
- Examine software vulnerabilities and security solutions for reducing the risk of exploitation
- Explain monitoring capabilities and requirements and how those may raise privacy concerns
- Identify physical security controls and the relationship between physical and IT security
- Explain incident response capabilities
- Identify legal considerations and investigative techniques when it comes to cybersecurity
- Research trends in cybersecurity
Introduction to Cyber Security Training – Course Syllabus:
Cybersecurity Awareness
- What is security?
- Confidentiality, integrity, and availability
- Security baselining
- Security concerns: Humans
- Types of threats
- Security controls
- What is hacking?
- Risk management
- Data in motion vs. data at rest
- Module review
Network Discovery
- Networking review
- Discovery, footprinting, and scanning
- Common vulnerabilities and exposures
- Security policies
- Vulnerabilities
- Module review
Systems Hardening
- What is hardening?
- Types of systems that can be hardened
- Security baselines
- How to harden systems
- Hardening systems by role
- Mobile devices
- Hardening on the network
- Analysis tools
- Authentication, authorization, and accounting
- Physical security
- Module review
Security Architecture
- Security architecture
- Network devices
- Network zones
- Network segmentation
- Network Address Translation
- Network Access Control
- Module review
Data Security
- Cryptography
- Principles of permissions
- Steganography
- Module review
Public Key Infrastructure
- Public key infrastructure
- Certification authorities
- Enabling trust
- Certificates
- CA management
- Module review
Identity Management
- What is identity management?
- Personally identifiable information
- Authentication factors
- Directory services
- Kerberos
- Windows NT LAN Manager
- Password policies
- Cracking passwords
- Password assessment tools
- Password managers
- Group accounts
- Service accounts
- Federated identities
- Identity as a Service
- Module review
Network Hardening
- Limiting remote admin access
- AAA: Administrative access
- Simple Network Management Protocol
- Network segmentation
- Limiting physical access
- Establishing secure access
- Network devices
- Fundamental device protection summary
- Traffic filtering best practices
- Module review
Malware
- What is malware?
- Infection methods
- Types of malware
- Backdoors
- Countermeasures
- Protection tools
- Module review
Social Engineering
- What is social engineering?
- Social engineering targets
- Social engineering attacks
- Statistical data
- Information harvesting
- Preventing social engineering
- Cyber awareness: Policies and procedures
- Social media
- Module review
Software Security
- Software engineering
- Security guidelines
- Software vulnerabilities
- Module review
Environment Monitoring
- Monitoring
- Monitoring vs. logging
- Monitoring/logging benefits
- Logging
- Metrics
- Module review
Physical Security
- What is physical security?
- Defense in depth
- Types of physical security controls
- Device security
- Human security
- Security policies
- Equipment tracking
- Module review
Incident Response
- Disaster types
- Incident investigation tips
- Business continuity planning
- Disaster recovery plan
- Forensic incident response
- Module review
Legal Considerations
- Regulatory compliance
- Cybercrime
- Module review
Trends in Cybersecurity
- Cybersecurity design constraints
- Cyber driving forces
- How connected are you?
- How reliant on connectivity, are you?
- Identity management
- Cybersecurity standards
- Cybersecurity training
Course Look Around
- Looking back
- Looking forward
- Planning your journey
LABS
Lab 1: Explore HR Security
Lab 2: Interpret Scanning Results
Lab 3: Harden Servers and Workstations
Lab:4 Security Architecture
Lab 5: Protect Data
Lab 6: Configure a PKI
Lab 7: Manage Passwords
Lab 8: Explore Hardening Recommendations and Known Vulnerabilities
Lab 9: Detect Malware
Lab 10: Social Engineering
Lab 11: Privilege Escalation
Lab 12: Monitor a System
Lab 13: Implement Physical Security
Lab 14: Incident Response
Lab 15: Review Legal Considerations
Whether you are looking for general information or have a specific question, we want to help!
Request More Information