Course description

A comprehensive program means qualifying individuals in the fields of cybersecurity and artificial intelligence.


Cyber Security Awareness (CSA)

Learning Objectives:

·       Increase the understanding of the cyber threat landscape;

·       Identify measures to secure your organization’s digital footprint;

·       Analyze cybercrime case studies to demonstrate real-world consequences;

·       Identify techniques to drive a Cyber Security culture in an organization;

·       Understand why organizational behavior must adopt safe cyber practices;

·       Understand techniques used by adversaries and how to protect against them;

·       Increase knowledge of safe and responsible use of information technology;

·       Understand the risks associated with information sharing using social media;

·       Gain insight into how to explain to executives the importance of cyber security in an organization.

 

Cyber Security Awareness for Executives

Learning Objectives:

·       Effectively understand and discuss real-world hacking events;

·       Understand exploitation techniques used by hackers;

·       Mitigate risk by demystifying cyber security jargon;

·       Assess the damage malware can cause;

·       Understand cyber defense operations.

 

Certificate in Information Security Management Principles (CISMP)

 

Objectives

·          Trainees will gain a comprehensive understanding of:

·          Key terms and concepts in information security

·          The process of risk management and the appropriate use of controls

·          Incident management

·          The importance of auditing, change control and configuration management

·          The needs for security policies, standards, operating procedures and guidelines

 

Ethical Hacking Associate (EHA)

Outline

               Information security in the corporate world

               Ethics and law in relation to ethical hacking

               Discovery

               Discovering Enterprise Assets and Vulnerabilities through Effective Scanning

               Threat Modelling

               OSINT gathering

               Active and Passive Reconnaissance

               Enhanced Vulnerability Scanning and Automation

               Vulnerability Validation, Triage, and Data Management

               Remediation and reporting

               Vulnerability Assessment Foundry

               Comprehensive Pen Test Planning, Scoping, and Recon

               In-depth Scanning

               Exploitation

               Post-Exploitation

               Hands-on training

               Full-day: real-world Vulnerability Assessment and Penetration Test Exercise

               In-Depth Password Attacks and Web App Pen Testing

               Conducting penetration testing engagements

               The professionalism, communication skills, ethics and the law associated with penetration testing

               Risk management

               Required critical thinking when conducting security testing

 

Penetration Testing Practitioner (PTP)

Objectives

·       Types of penetration testing, security audit, vulnerability assessment and testing roadmap.

·       Foot printing, foot printing tools and countermeasures.

·       Network scanning techniques and countermeasures.

·       Enumeration techniques and countermeasures.

·       System hacking methodology, steganography, steganalysis attacks and covering tracks.

·       Trojans, Trojan analysis and Trojan countermeasures.

·       Viruses, virus analysis, computer worms, malware analysis procedure and countermeasures.

·       Packet-sniffing techniques and how to defend against sniffing.

·       Social engineering techniques, identify theft and countermeasures.

·       DoS/DDoS attack techniques, botnets and attack tools.

·       Session hijacking techniques and countermeasures.

·       Types of web server and web application attacks, attack methodology and countermeasures.

·       SQL injection attacks and injection detection tools.

·       Wireless encryption, wireless hacking methodology and wireless hacking tools.

 

Digital Forensics and Incident Response Associate (DFIRA)

Objectives

·       Develop skills using fully immersive, hands-on training using a variety of tools

·       Effectively discover host or network breaches in order to triage potential attacks

·       Understand how malware typically finds its way onto a system

·       Understand variations of malware and cyber threats

·       Gain knowledge of the fundamentals of Windows operating systems

·       Gain knowledge of file systems and processes

·       Interrogate the Windows Registry

·       Perform volatile memory capture (RAM dumps)

·       Perform forensic imaging

·       Differentiate between law enforcement and corporate incident response.

·       Perform Network traffic forensics

·       Perform Disk-based forensics

·       Find and identify important artefacts

·       Report findings

Digital Forensics and Incident Response Practitioner (DFIRP)

Objectives

·       Understand the functional requirements needed when responding to an incident.

·       Understand the roles in an organisation and the language of reporting that may be needed.

·       Determine the terminology required when liaising with clients when planning to collect data.

·       Prepare generic forensics jump kit.

·       Strategically prepare a plan of action when identifying the scope of work.

 

Linux System Administration

Outline

   Linux Essentials

o  Introduction to Linux

o  Installing Linux

o  Working with the Linux shell

o  Managing Files & Directories

o  Using Text Editors

o  Managing Linux Software

o  Managing Linux Users & Groups

o  Managing Ownership and Permissions

o  Managing Linux Processes

o  Managing Linux Network Settings

o  Managing Linux File Systems

   Linux Certified System Administrator

o  Fundamentals Commands

o  Scripting

o  System Initialization

o  The Filesystem

o  Access Control & root Account

o  Software Installation & Management

o  Schedule & Automate Tasks

o  Networking

 

Cyber Security Foundation

Outline:

   Introduction to Cyber Security

o  Humans (Employees)

o  Social Engineering Attacks

o  Phishing Attacks

o  Spear Phishing

o  The Company’s Weakest Link (The Employee)

o  Bring Your Own Device (BYOD)

   Digital Space (Devices and Networks)

o  Authentication & Authorization

o  Password Management

o  Securing Privileged Access

o  Patches and Updates

o  Host Based Security Measures

o  Network Based Security Measures

o  File Sharing Security

o  Removable Media

o  Malware

o  Ransomware

Computer Networking

Outline

   What is Networking?

   OSI and the TCP/IP network models.

   Network Protocols.

   Network Devices.

   Switching

   Routing

   Wireless Networks

 

Windows Administration

Outline

   Windows 10 & Windows Server.

   Windows File System (NTFS).

   Local Users & Groups.

   Windows Registry.

   Active Directory.

   Networking in Windows.

   Windows Security.

   Introduction to Windows PowerShell & Command Prompt.

Python Programming

Outline

   Introduction to Python

   Python Environment

   Variables

   Basic Data Types

   Lists, Tuples & Dictionaries

   Interactivity

   Choices & Decisions

   Functions & Modules

   Working With Files

   Python Projects

 

Introduction to Ethical Hacking and Digital Forensics

Outline

   Exploring the different roles in offensive and defensive security

   Understanding the difference between vulnerability assessments, penetration tests, and red teaming.

   Penetration testing methodology

   Introduction to cyber incident response

   Understanding the core concepts of digital forensic investigations

Computer Forensics Investigation Methodology


What will i learn?

Requirements

Green Circle

﷼8000

Lectures

0

Skill level

Beginner

Expiry period

Lifetime

Related courses