A comprehensive program means qualifying individuals in the fields of cybersecurity and artificial intelligence.
·
Increase the understanding of the cyber threat landscape;
· Identify measures to secure
your organization’s digital footprint;
·
Analyze cybercrime case studies to demonstrate real-world consequences;
·
Identify techniques to drive a Cyber
Security culture in an
organization;
· Understand why organizational behavior must adopt safe cyber practices;
·
Understand techniques used by adversaries and how to protect against
them;
· Increase knowledge of safe and responsible use of information technology;
·
Understand the risks associated with information sharing
using social media;
· Gain insight into how to explain to executives the importance of cyber security
in an organization.
Cyber Security Awareness for Executives
·
Effectively understand and discuss real-world hacking events;
· Understand exploitation techniques used by hackers;
·
Mitigate risk by demystifying cyber security jargon;
·
Assess the damage malware
can cause;
·
Understand cyber defense operations.
·
Trainees will gain a comprehensive understanding of:
·
Key terms
and concepts in information security
·
The process of risk management and the appropriate use of controls
·
Incident management
·
The importance of auditing, change control and configuration management
·
The needs for security
policies, standards, operating procedures and guidelines
•
Information security
in the corporate world
•
Ethics and law in relation to ethical hacking
•
Discovery
•
Discovering Enterprise Assets and Vulnerabilities through Effective Scanning
•
Threat Modelling
•
OSINT gathering
•
Active and Passive Reconnaissance
•
Enhanced Vulnerability Scanning and Automation
•
Vulnerability Validation, Triage, and Data Management
•
Remediation and reporting
•
Vulnerability Assessment Foundry
•
Comprehensive Pen Test Planning, Scoping, and Recon
•
In-depth Scanning
•
Exploitation
•
Post-Exploitation
•
Hands-on training
•
Full-day: real-world Vulnerability Assessment and Penetration Test Exercise
•
In-Depth Password
Attacks and Web App Pen
Testing
•
Conducting penetration testing engagements
•
The professionalism, communication skills, ethics
and the law associated with penetration testing
•
Risk management
•
Required critical
thinking when conducting security testing
Penetration Testing
Practitioner (PTP)
· Types of penetration testing, security audit,
vulnerability assessment and testing roadmap.
·
Foot printing, foot printing tools and countermeasures.
·
Network scanning
techniques and countermeasures.
·
Enumeration techniques and countermeasures.
·
System hacking
methodology, steganography, steganalysis attacks and covering
tracks.
·
Trojans, Trojan analysis
and Trojan countermeasures.
·
Viruses, virus
analysis, computer worms,
malware analysis procedure and countermeasures.
·
Packet-sniffing techniques and how to defend against sniffing.
·
Social engineering techniques, identify theft and countermeasures.
·
DoS/DDoS attack
techniques, botnets and attack tools.
·
Session hijacking techniques and countermeasures.
·
Types of web server and web application attacks,
attack methodology and countermeasures.
·
SQL injection
attacks and injection
detection tools.
·
Wireless encryption, wireless hacking methodology and wireless hacking
tools.
·
Develop skills
using fully immersive,
hands-on training using a variety of tools
·
Effectively discover host or network breaches
in order to triage potential attacks
·
Understand how malware typically finds its way onto a system
·
Understand variations of malware and cyber threats
·
Gain knowledge
of the fundamentals of Windows
operating systems
·
Gain knowledge of file systems
and processes
·
Interrogate the Windows Registry
·
Perform volatile
memory capture (RAM dumps)
·
Perform forensic
imaging
·
Differentiate between
law enforcement and corporate incident
response.
·
Perform Network
traffic forensics
·
Perform Disk-based forensics
·
Find and identify important artefacts
·
Report findings
·
Understand the functional requirements needed when responding to an incident.
·
Understand the roles
in an organisation and the language
of reporting that may be needed.
·
Determine the terminology
required when liaising with clients
when planning to collect data.
·
Prepare generic
forensics jump kit.
·
Strategically prepare
a plan of action when identifying the scope of work.
Linux System
Administration
●
Linux Essentials
o Introduction to Linux
o Installing Linux
o Working with the Linux shell
o Managing Files & Directories
o Using Text Editors
o Managing Linux Software
o Managing Linux Users & Groups
o Managing Ownership and Permissions
o Managing Linux Processes
o Managing Linux Network
Settings
o Managing Linux File
Systems
●
Linux Certified
System Administrator
o Fundamentals Commands
o Scripting
o System Initialization
o The Filesystem
o Access Control & root
Account
o Software Installation & Management
o Schedule & Automate
Tasks
o Networking
Cyber Security
Foundation
●
Introduction to Cyber Security
o Humans (Employees)
o Social Engineering Attacks
o Phishing Attacks
o Spear Phishing
o The Company’s Weakest
Link (The Employee)
o Bring Your Own Device
(BYOD)
●
Digital Space (Devices and Networks)
o Authentication & Authorization
o Password Management
o Securing Privileged Access
o Patches and Updates
o Host Based Security
Measures
o Network Based Security
Measures
o File Sharing Security
o Removable Media
o Malware
o Ransomware
●
What is Networking?
●
OSI and the TCP/IP network models.
●
Network Protocols.
●
Network Devices.
●
Switching
●
Routing
●
Wireless Networks
Windows Administration
●
Windows 10 & Windows
Server.
●
Windows File System (NTFS).
●
Local Users & Groups.
●
Windows Registry.
●
Active Directory.
●
Networking in Windows.
●
Windows Security.
●
Introduction to Windows PowerShell & Command Prompt.
●
Introduction to
Python
●
Python Environment
●
Variables
●
Basic Data Types
●
Lists, Tuples & Dictionaries
●
Interactivity
●
Choices &
Decisions
●
Functions & Modules
●
Working With Files
●
Python Projects
Introduction to Ethical Hacking
and Digital Forensics
●
Exploring the different roles
in offensive and defensive security
● Understanding the difference between vulnerability assessments, penetration tests, and red teaming.
●
Penetration testing
methodology
●
Introduction to cyber incident
response
●
Understanding the core concepts of digital forensic investigations
Computer Forensics
Investigation Methodology