Cyber Fundamentals with Hands-on Labs

Telecom professional implementing cyber security on laptop

This course is designed to help those without prior Cyber Security knowledge or experience to understand the fundamentals of Cyber Security. The topics covered in this course include Cyber Security terminologies, the basics of computer networks, cryptographic principles, penetration testing, and more.

The course will enable participants to gain insights into the modern security environment, particularly the cyber threat landscape and attackers’ mentality. Participants will be able to learn how attackers work, what tools they use and what vulnerabilities they target.

The hands-on sessions aim to help participants better grasp the information even if they are new to some of the topics. Workstations will be equipped with Wireshark.

  • High-level Managers
  • Pre-sales Managers
  • IT Managers
  • QA and Technical Support Managers
Instructor-led Training
  • Classroom: 4 days
  • LIVE Virtual*: 28 hours

*Note:

  • A minimum of 6 or more participants are required for a company-based LIVE Virtual course to commence
  • LIVE Virtual courses can be conducted for 5 hours or 7 hours daily. Please note that the number of training days will be extended if you opt for 5 hours daily.

There are no upcoming course dates currently scheduled for this course. If you are keen on attending this course, please register your interest and indicate your preferred training dates via our course enquiry form for us to open a Classroom/LIVE Virtual class schedule for this course.

For High-level Managers,

  • Lead and manage meetings related to Cyber Security threats
  • Conduct discussions regarding cyber risk management within the organization with IT personnel
  • Be able to recruit highly skilled Cyber Security personnel

For Pre-sales Managers,

  • Capture your customers’ needs and concerns regarding cybersecurity aspects of integrating your products into the customers infrastructure
  • Present and discuss the security aspects of proposed technological products and solutions with your customers
  • Interact with potential customer with knowledge and integrity regarding security aspects of products
  • Knowledge of the cyber security buzzwords and topics

For Technical Support Managers,

  • Communicate with confidence Cyber Security topics, terms, and concepts
  • Understand computer network basics and fundamental grasp of networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
  • Discuss various security technologies related to products with customers

At the end of the course, participants will be able to:

  • Identify threats and cyber attacks
  • Defend against various attacks using appropriate technological means that will be presented during the course
  • Train teams and colleges at work on cautious behavior against cyberattacks
  • Utilise various tools to check network weaknesses and vulnerabilities
  •  
  1.   Introduction to Cyber Security
  2.   Basics of Networking
  3.   OSI Layer Model
  4.   The Physical Layer and Vulnerabilities
  5.   Data Link Layer (IEEE Ethernet) – the Second Layer
  6.   The Third Layer and IP Vulnerabilities
  7.   The Fourth Layer – Transportation Layers
  8.   Inspection and Interception Tool – Hands-On
  9.   Internetworking
  10.   Inspection and Interception Tool – Hands-On
  11.   Basics of Security Management
  12.   Applications Evolution and Security Issues
  13.   MiTM Challenge and Confidentiality Solutions
  14.   Virtual Machines – Hands-On
  15.   Kali Linux – Hands-On
  16.   Inspection and Interception Tool – Hands-On
  17.   Basic Linux Commands
  18.   Offensive Security: Kali Linux
  19.   Linux CLI Hands-On
  20.   Network Scanning
  21.   NMAP – Hands-On
  22.   Maltego – Demo
  23.   OpenVAS for Vulnerabilities Scanning
  24.   OpenVAS – Demo
  25.   Firewall
  26.   IPTables Firewall
  27.   Firewall – Hands-On
  28.   Introduction to Cryptography
  29.   Symmetric Cryptography
  30.   Asymmetric Cryptography
  31.   Certificates and Authentication Process
  32.   Penetration Testing
  33.   Penetration Testing (Cont’d)
  34.   Network Penetration – Demo
  35.   Wireless Network Penetration
  36.   Wireless Network Penetration – Demo
  37.   SQL Injection – Demo and Hands-On
  38.   Cyber Security in the Organization

Note: A Certificate of Completion will only be issued upon achieving at least 75% attendance for the course.

Testimonials

“Real life examples of how hackers work and the details given for IP packet analysis were good. I now know how to look into the network vulnerabilities.”
M1 Limited

Be the first to add a review.

Please, login to leave a review
Enrolled: 0 students

Upcoming Classes

You cannot copy content of this page