Introduction to Cyber Security Training

Introduction to Cyber Security Training

Print Friendly, PDF & Email


Introduction to Cyber Security Training Course – Hands-on

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

This comprehensive five-day Introduction to Cyber Security Training course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.

The hands-on, step-by-step learning format will enable you to grasp all the information presented even if some of the topics are new to you. You’ll learn fundamentals of cyber security that will serve as the foundation of your security skills and knowledge for years to come.

With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training course is the answer.

It explores cyber trends, threats—along with the broader topic of cybersecurity in a way that will matter to you. For instance, you’ll learn how to protect your personal privacy online while gaining additional insight on the challenges companies, and governmental and educational institutions face today. No prerequisites required.

Why take this Introduction to Cyber Security Training course?

• The Introduction to Cyber Security Training course lives up to its name as a thorough introduction to cyber security. The course is designed for those who have limited background in information technology, but who need to understand cyber security concepts, principles, and terms. If you fall into that category, Introduction to Cyber Security Training will serve your needs well.

Duration: 5 days

Introduction to Cyber Security TrainingRelated Courses

Customize It:

  • If you are familiar with some aspects of Introduction to Cyber Security Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Introduction to Cyber Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Introduction to Cyber Security Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Introduction to Cyber Security Training course:

  • Anyone new to cyber security and in need of an introduction to the fundamentals of security
  • Those who feel bombarded with complex technical security terms they don’t understand, but want to understand
  • Non-IT security managers who deal with technical issues and understand them and who worry their company will be the next mega-breach headline story on the 6 o’clock news
  • Professionals with basic computer and technical knowledge in all disciplines who need to be conversant in basic security concepts, principles, and terms, but who don’t need “deep in the weeds” detail
  • Those who have decided to make a career change to take advantage of the job opportunities in cyber security and need formal training and certification


The knowledge and skills that a learner must have before attending this Introduction to Cyber Security Training course are as follows:

  • Introduction to Cyber Security Training assumes basic knowledge of computers and technology
  • Introduction to Cyber Security Training makes no assumptions regarding prior security knowledge
  • We assume that students understand the basic functions of a computer and how to use one:

—We assume students already know how to open and operate a web browser, copy a file from one location to another, and perform other basic computer user functions


Upon completing this Introduction to Cyber Security Training course, learners will be able to meet these objectives:

  • Communicate with confidence regarding information security topics, terms, and concepts
  • Understand and apply the Principles of Least Privilege
  • Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
  • Build better passwords that are more secure while also being easier to remember and type
  • Grasp basic cryptographic principles, processes, procedures, and applications
  • Understand computer network basics
  • Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
  • Utilize built-in Windows tools to see your network settings
  • Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
  • Build a simple, but fully functional firewall configuration
  • Secure your browser using a variety of security plug-ins
  • Secure a wireless access point (also known as a wireless router)
  • Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as “potentially unwanted”.
  • Access a number of websites to better understand password security, encryption, phishing, browser security, etc.

Introduction to Cyber Security Training – Course Syllabus:

Module 1 – Security’s Foundation

Every good security practitioner and every good security program begins with the same mantra: learn the fundamentals. Introduction to Cyber Security Training starts by instilling familiarity with core security terms and principles. By the time you leave the classroom after the first day, you will fully understand the Principle of Least Privilege and Confidentiality, Integrity, Availability (CIA), and you’ll see why those principles drive all security discussions. You will be conversant in the fundamentals of risk management, security policy, and authentication/authorization/accountability.


Module 2 – Computer Functions and Networking

This course day begins with an explanation of how computers handle numbers using decimal, binary, and hexadecimal numbering systems. It also provides an understanding of how computers encode letters using the American Standard Code for Information Interchange (ASCII).

We then spend the remainder of the day on networking. All attacks or exploits have one thing in common: they take something that exists for perfectly valid reasons and misuse it in malicious ways. Always! So as security practitioners, to grasp what is invalid we must first understand what is valid – that is, how things like networks are supposed to work. Only once we have that understanding can we hope to understand the mechanics of malicious misuse of those networks – and only with that knowledge can we understand how security devices such as firewalls seek to thwart those attacks.

The networking discussion begins with a non-technical explanation of how data move across a network. From there we move to fundamental terminology dealing with network types and standards. You’ll learn about common network hardware such as switches and routers, and terms like “protocol” and “encapsulation.” We’ll give a very basic introduction to network addressing and port numbers and then work our way up the Open Systems Interconnection (OSI) protocol stack, introducing more detail only as we proceed to the next layer. In other words, we explain networking starting in non-technical terms and gradually progress to more technical detail as students are ready to take the next step.

By the end of our discussions, you’ll have a fundamental grasp of any number of critical technical networking acronyms that you’ve often heard but never quite understood, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.


Module 3 – An Introduction to Cryptography

Cryptography is one of the most complex issues faced by security practitioners. It is not a topic you can explain in passing, so we will spend some time on it. Not to worry, we won’t take you through the math behind cryptography. Instead, we learn basic crypto terminology and processes. What is steganography? What is substitution and transposition? What is a “work factor” in cryptography and why does it matter? What do we mean by symmetric and asymmetric key cryptography and “cryptographic hash,” and why do you need to know? How are those concepts used together in the real world to create cryptographic systems?


Module 4 – Cyber Security Technologies – Part 1

Our fourth day in the classroom begins our exploration of cyber security technologies. We begin with wireless network security (WiFi and Bluetooth), and mobile device security (i.e., cell phones). We follow that with a brief look at some common attacks. We then move into a discussion of malware and anti-malware technologies. We end the day with an examination of several data protection protocols used for email encryption, secure remote access, secure web access, secure file transfer, and Virtual Private Network (VPN) technologies.


Module 5 – Cyber Security Technologies – Part 2

The final day of our Introduction to Cyber Security Training journey continues the discussion of cyber security technologies. The day begins by looking at several security technologies, including compartmentalization, firewalls, Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS), sniffers, content filters, etc. We then take a good look at browser and web security, and the difficulties of securing the web environment. For example, students will understand why and how their browser connects to anywhere from 5 to 100 different Internet locations each time they load a single web page. We end the day with a look at system security to include hardening operating systems, patching, virtual machines, cloud computing, and backup.


Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Time frame: