[Online] Cyber Security Essentials (CSE)
Event Information
About this Event
Course Information
Duration: 3 Day / 24 Hours
Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
Who Should Attend: Network Engineer, System Analyst, CSO, CISO, Software Engineer, Technologist, System Engineer, IT Professionals and Anyone seeking to acquire essential knowledge on Cyber Security
Course Objective
Cyber Security Essentials (CSE) is designed for anyone interested in acquiring the essential knowledge and skills required for defend their organization against any Cyber Threats.
Pre-Requisite
NA
Examination
Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered
Module 1 Cyber Security in The Real World
Topics Covered
- Introduction to Cyber Security
- Real World Hacking
- Introduction to Ethical Hacking
- Ethical Hacking to Enhance Security
Module 2 Fundamental of Networking
Topics Covered
- OSI & TCP/IP Model
- IP Addressing
- Types of Network and Topologies
- Network Services and Protocols
- Network Devices and Media
- Network Troubleshooting
Module 3 Virtualization & Cloud Computing
Topics Covered
- Benefits of Virtualization
- Types of Virtualization
- Common Security Issues of VM
- Benefits of Cloud Computing
- Types & Services of Cloud Computing
- Security Issues with Cloud Computing
Module 4 Shodan and GHDB
Topics Covered
- Introduction to Shodan
- Explore Vulnerable Services and Servers
- Introduction to GHDB/Google Dorks
- Finding Bugs and Vulnerable Targets
Module 5 Build a Cyber Security Practice Lab
Topics Covered
- Checklist for Cyber Security Lab
- ISO and VM Lab
- Configure Lab for Hacking Safely
- Vulnerable VM Configuration
- Open-source Security Tools
Module 6 Essential Security Technologies
Topics Covered
- SSL & TLS
- Firewall, UTM, IPS & IDS
- Antivirus & Endpoint Protection
- VPN & Proxy
- Honeypot & DMZ
Module 7 Attack Types
Topics Covered
- DoS & DDoS
- Sniffing & Spoofing
- System & Network
- Web Based Attacks
- Man in the Middle
- Zero Day Attacks
- DNS Hijacking
Module 8 Malware Family
Topics Covered
- Virus & Worms
- Rootkit & Trojan
- Botnets & Zombie Network
- Ransomware
- Adwares & Spywares
Module 9 Phases of Hacking
Topics Covered
- Information Gathering
- Scanning
- Gaining Access
- Maintain Access
- Clearing Tracks
Module 10 Information Security / Wireless Security
Topics Covered
- Common Challenges
- Data Classification
- Non-repudiations
- Risk Assessment
- Managing Risk
- Wireless Fundamentals
- Rough Access Point
- Bypassing WPA / WPA2