This course is designed to provide participants with a comprehensive essential principles and practices of cybersecurity.
In today's digital age, where technology is pivotal in every aspect of our lives, understanding and implementing robust cybersecurity measures is paramount.
This course will provide theoretical and practical knowledge of IT and cyber security and security methods for computer, network and electronic communication.
The course consists of various chapters and will cover fundamentals, such as IT versus ICS, threats and their sources, authentication, computer access control, cryptography, network security, network firewall concepts, intrusion detection.
The student will get a comprehensive view on security in the cyber space.
- Introducing Computer Networks
- Dissecting the OSI Model
- Identifying Network Components
- Understanding Ethernet
- Working with IP Addresses
- Routing Traffic
- Introducing Wide-Area Networks
- Connecting Wirelessly
- Using Command-Line Utilities
- Managing and securing a Network
- Troubleshooting Network Issues
- Mastering Security Basics
- Exploring Control Types and Methods
- Understanding Basic Network Security
- Securing Your Network
- Securing Hosts and Data
- Understanding Malware and Social
Engineering
- Identifying Advanced Attacks
- Managing Risk
- Preparing for Business Continuity
- Understanding Cryptography
- Exploring Operational Security
- Encryption
- Randomness
- Cryptographic Security
- Block Ciphers
- Stream Ciphers
- Hash Functions
- Keyed Hashing
- Authenticated Encryption
- Hard Problems
- RSA
- Diffie-Hellman
- Elliptic Curves
- TLS
- What is Machine Data
- What is Splunk
- Installing Splunk
- Getting Data In
- Basic Searching
- Using Fields
- Best Practices
- SPL Fundamentals
- Transforming Commands
- Reports and Dashboards
- Pivot and Datasets
- Lookups
- Scheduled Reports and Alerts
- Ethical Hacking Overview
- TCP/IP Concepts Review
- Network and Computer Attacks
- Footprinting and Social Engineering
- Port Scanning
- Enumeration
- Programming for Security Professionals
- Desktop and Server OS Vulnerabilites
- Embedded Operating Systems: The Hidden
Threat
- Hacking Web Servers
- Hacking Wireless Networks
- Cryptography
- Network Protection Systems
- Real-World Incidents
- IR Management Handbook
- Pre-Incident Preparation
- Getting the Investigation Started on the
Right Foot
- Initial Development of Leads
- Discovering the Scope of the Incident
- Live Data Collection
- Forensic Duplication
- Network Evidence
- Enterprise Services
- Analysis Methodology
- Investigating Windows Systems (Part 1 of
3)
- Investigating Windows Systems (Part 2 of
3)
- Investigating Windows Systems (Part 3 of
3)
- Investigating Mac OS X Systems
- Investigating Applications
- Malware Triage
- Report Writing
- Remediation Introduction
- Using Kali Linux
- Programming
- Using the Metasploit Framework
- Information Gathering
- Finding Vulnerabilities and Exploiting Domains
- Capturing Traffic
- Exploitation
- Password Attacks
- Client-Side Exploitation
- Social Engineering
- Bypassing Antivirus Applications
- Post Exploitation Part 1
- Post Exploitation Part 2