The main propose is to teach the fundamental investigative techniques needed to respond to threat actors and intrusion scenarios. The latest in forensics and intrusion techniques.

Students will learn how to conduct rapid triage on a system to determine if it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms, develop indicators of compromise to further scope an incident, and much more.

 

Developers, managers, IT /Network administrators

Basic computers networks and information security knowledge

}

40 Hours

Cyber Security

h

Certificate: No

Price: contact us for more details

Don't Be Shy

Leave your details and one of our customer service representatives will respond to you as soon as possible

Course Outline

Objectives

Upon successful completion of this course, students will learn the basic knowledge about:

  • The basic concepts of the information security and cyber world
  • Major players and threats in the cyber world
  • Common defense/attack methodologies
  • Concepts in the it infrastructure communication world
  • How to handle a cyber-event
  • The range of tools, technics and procedures that can help mitigate cyber risks Social engineering Future aspects of cyber

Introduction

Getting familiar with the world of cyber security

  • Definition of information security
  • Information security Vs. Cyber
  • The virtual organization
  • Attacker types and categories in the cyber landscape
  • Social engineering – Manipulating the human factor

 

Cyber security concepts

Introducing basic concepts and framework of cyber security:

  • Cyber risk management framework
  • Cyber threats types and vectors
  • Cyber security policies
  • Principals in cyber security process controls
  • Basic principals in cyber defense

Cyber architecture principals

Learning about cyber security architecture fundamentals

  • Cyber perimeter concepts
  • The OSI Module
  • TCP/IP Communication protocol
  • DID – Defense In Depth
  • Firewalls
  • Segmentation principals
  • IPS/IDS
  • Encryption

Network/System/Application/Data Security

Cyber security concepts and practices while defending networks, systems, applications and data

  • Basic monitoring
  • Network management
  • Securing systems
  • Securing applications
  • SSDLC
  • OWASP top 10 security risks
  • Data classification

 

Incident response

What is an event? What is an incident? And what are the ways to mitigate them

  • Event/Incident definition
  • Categories & types
  • Security event management
  • BCP/DRP

 

Various cyber issues

Consider and analyze various aspects regarding the cyber world

  • Cyber insurance
  • Darknet
  • Notable cyber attacks

 

The future landscape of cyber

Reviewing security implications and evolving technologies

  • Secure by design principal
  • IOT
  • Cloud
  • BYOD
  • Machine learning & BOTs
  • Mobile