Introduction to Cyber Security Training course with hands-on labs (Online, Onsite and Classroom Live)
Introduction to Cyber Security Training, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security course is the answer.
In this Introduction to Cyber Security Training course, you will discover the importance of cybersecurity in information technology. The objective is to understand cyber-attacks and the techniques used to take control of an unsecure system. This Introduction to Cyber Security course also presents the defensive measures security teams can take to prevent attacks, and provides an overview of the malicious software types used in computer networks.
There is no question that Cyber Security is a now a business priority and a prevailing global issue. The challenge lies in where to begin the daunting task of securing your infrastructure, training your end users and preparing your organization to face the year ahead. Introduction to Cyber Security is the foundational training for all users, whether management, IT, end user or programmer. Equip your team with the most up-to-date knowledge of the threats we all face and the hands-on skills to address them. With information gathered from the most trusted sources (CERT, NIST, DHS and others), this course presents an objective, complete, and cutting-edge view of our current environment as well as a vision of the near future of Cyber Security.
Duration: 5 days
- Introduction to Cyber security Training - From CIA to APT: by Edward G. Amoroso and Matthew E. Amoroso/Paperback/Amazon.com
- Introduction to Cyber security Training - Passbooks Study Guide (100) (Excelsior / Regents College Examinations) by National Learning Corporation / Paperback -Amazon
- Introduction to Cyber security Training - Cybersecurity Program Development for Business: The Essential Planning Guide by Chris Moschovitis, Sean Pratt/Amazon
- Security Essentials Training
- Cloud Security Fundamentals Training
- Certified Cloud Security Professional (CCSP) Training
- We can adapt this Introduction to Cyber Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Introduction to Cyber Security training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Introduction to Cyber Security training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Introduction to Cyber Security course in manner understandable to lay audiences.
Audience / Target Group
The target audience for this Introduction to Cyber Security course:
- The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information.
The knowledge and skills that a learner must have before attending this Introduction to Cyber Security course are as follows:
- Basic knowledge of computers and technology
Introduction to Cyber Security Training - Objectives:
Upon completing this Introduction to Cyber Security course, learners will be able to meet these objectives:
- Explain basic cyber security terminology; have skills for keeping up to date on cyber security issues; and be able to identify information assets.
- Describe basic authentication mechanisms; have skills to improve their password security; and be aware of alternative authentication methods.
- Identify main malware types; awareness of different malware propagation methods; and skills for preventing malware infections.
- Describe cryptography terminology; be able to use cryptography for email; be aware of applications of cryptography.
- Demonstrate understanding of firewalls, virtual private networks and network intrusion detection and prevention technologies.
- Describe legal and regulatory issues relating to cyber security; and understand how to recover from security failures.
- Apply basic risk analysis and management techniques.
Introduction to Cyber Security Training - Course Content:
- Threat landscape: terminology, cyber security threats, keeping up to date
- Authentication: access control, passwords, two-factor authentication
- Malware: types of malware, attack vectors, preventing infection
- Networking and communications: fundamentals, security challenges, standards
- Cryptography: symmetric and asymmetric cryptography, applications
- Network security: firewalls, virtual private networks, intrusion detection / prevention
- When your defences fail: cyber security laws, recovering from attacks
- Managing security risks: risk analysis and management