Certificate Course on: Cyber Security 1500

  • Duration: 30 Hours

  • Per Day: 1-2 Hours
Cyber Security

The Training session will be live *Recorded lectures will be available

Every organization is adhere to ensuring Cyber Security.The live trainer lead course will develops the ability to protect its information systems from impairment or even theft is essential to success. With our Cyber Security Training course participants will understand the different types of malware and security attacks and develop effective prevention methods which will increase overall security.

Week Duration Topic Contents
Week 1 1-2 Hours General Introduction to IT & Cyber Security
  • Difference Between Information Security and Cyber Security
  • The Trinity of IT Security - CIA
  • Basic Terminologies
  • Computer Protocols & Cookies
Week 1 1-2 Hours Mind of a Hacker
  • What is NOT Hacking
  • Types of Hackers
  • The Hacking Methodology
  • The WhoIS Query
  • Social Engineering
Week 1 1-2 Hours Attacks
  • Brute Force Attacks
  • Phishing
  • Bots and Botnets
Week 1 1-2 Hours Attacks
  • DoS and DDoS
  • Pings
  • Man in the Middle Attacks
  • SQL Injections
Week 1 1-2 Hours Malware
  • Introduction to Malware
  • Viruses & Worms
  • Trojans
  • Adware and Spyware
  • Ransomware
  • Other Types of Malware
Week 1 1-2 Hours Defenses
  • Anti Virus
  • Encryption
  • Firewalls
  • Biometrics
Week 2 1-2 Hours Defenses
  • Factor Authentication Methods
  • Honey Pots and DMZs
  • Security for Wireless Networks
  • Password Management
Week 2 1-2 Hours Information Security at the Work Place
  • BYOD Management
  • A Sample BYOD Policy
  • Mobile Device Management
  • The Security vs Ease of Access Paradox
  • The Weakest Link & The Disgruntled Employee
Week 2 1-2 Hours Cyber Warfare and Cyber Attacks Against Companies
  • Introduction to Cyber Warfare
  • The Attack Against Estonia
  • Stuxnet and the Attack Against Iran
  • The Sony Hack
Week 2 1-2 Hours Cybersecurity: Methods of Protection Various method for Securing Email and personal data from hackers
Week 2 1-2 Hours Demo on Various Open source Security tools Keepass
Week 2 1-2 Hours Demo on Various Open source Security tools Veracrypt
Week 2 1-2 Hours Demo on Various Open source Security tools Cryptoforge, Cryptool
Week 2 1-2 Hours Demo on Various Open source Security tools Keylogger
Week 3 1-2 Hours Demo on Various Open source Security tools Quick Checksum Verifier