Cybersecurity Foundations [9701]

Durée totale
Localisation
A cet endroit, En ligne
Date et lieu de début

Cybersecurity Foundations [9701]

Global Knowledge Belgium BV
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

computer En ligne: VIRTUAL TRAINING CENTER
14 fév. 2022 jusqu'au 15 fév. 2022

Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

If you consider a career in cyber security. This is the place to start. During this intensive hands on course you will get a deep dive into the most important domains that are part of cyber security.

This 2 day course is a combination of lectures, labs and case studies that will give you a global perspective of the challenges of designing a secure system and understand how hackers operate.

There is a focus is on current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and common compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environ…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Cybersecurity, Développeur / Developer, CompTIA, Data privacy et IT Architect.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

If you consider a career in cyber security. This is the place to start. During this intensive hands on course you will get a deep dive into the most important domains that are part of cyber security.

This 2 day course is a combination of lectures, labs and case studies that will give you a global perspective of the challenges of designing a secure system and understand how hackers operate.

There is a focus is on current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and common compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

After this course you will have a good understanding of cyber security and how to protect your organization. This course provides all the foundation to kickstart building cyber security skills. 

OBJECTIVES

After completing this course you should be able to understand:

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • The attack cycle perpetrated by malicious hackers
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Standards-based cryptographic solutions for securing communications

AUDIENCE

IT and non-IT Professionals. If you want to start understanding cybersecurity and don't know where to start. Your journey starts here!

  • Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities
  • Network professionals looking to advance their knowledge and explore cybersecurity as a career path
  • Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level

NEXT STEP

The following courses are recommended for further study:

Technical track (certifications)

  • CND - Certified Network Defender
  • CEH - Certifed Ethical Hacker
  • CSX - Cyber Security Fundamentals

Management track (certifications)

  • Comptia+ Security
  • CISM - Certified Information Security Manager
  • CISA - Certified Information Security Auditor

CONTENT

IT & Cyber attacks

1. IT & Cyber attacks (CH)

  • The Cyber Battlefield & Evolution
  • Backdoor and trojans
  • The Structure of the Internet and TCP/IP (Networking)
  • Firewalls and Edge Devices
  • Securing Hosts and Servers
  • Securing Communications
  • Authentication and Cryptographic solutions
  • Vulnerability Assessment Tools
  • Footprinting / Scanning
  • Breaking and Entering
  • Forensic Analysis

2. Awareness

  • Social engineering basics
  • Policies and Procedures 

Risk Management

1. Standards & Frameworks including:

  • ISO27001, BIO, NEN 7510, NIST,
  • Security Policy Management & Risk management

2. Privacy by design
3. Securiy by design

The following labs will be available for you to exercise

Lab 1: Understanding TCP/IP

  • Convert Binary to Decimal
  • Convert Decimal to Binary
  • Convert Hexadecimal to Decimal
  • Analyze Wireshark Traffic

Lab 2: Vulnerability Assessment

  • Use Nessus
  • Identify Coding Issues

Lab 3: Cyber Awareness

  • Identifying Social Engineering Attacks
  • Detect Phishing Using Internet-Based Tools

Lab 4: Cyber Scanning

  • Trace Domains and IP Addresses
  • Map Web Site Content with Teleport Pro
  • Use Cheops for Graphical Display of Network
  • Use GFI LanGuard
  • Scan Using Nmap
  • Scan Using Zenmap
  • Perform Banner Grabbing

Lab 5: Cyber Attacks and Passwords

  • Crack Passwords via the GUI
  • Crack Passwords via the CLI
  • Hide Files with NTFS

Lab 6: Cyber Attacks and Backdoors

  • Perform Netcat Banner Grabbing
  • Perform Netcat Shoveling
  • Use Netcat to Port Scan
  • Create and Detect a Trojan

Lab 7: Risk Assessment

  • Review Profile and Complete a Criticality Ranking
  • Complete a Criticality Review
  • Complete a Threat Profile
  • Evaluate the Support Policy and Cost

Lab 8: Security Policies

  • Review Security Policies
  • Develop an Incident Response Policy

Lab 9: Host Security

  • Use the RECUB Trojan
  • Identify the RECUB Service
  • Harden the System

Lab 10: Covert Communications

  • Hide Messages Using S-Tools
  • Use Spam Mimic

Lab 11: Authentication and Cryptography

  • Use Ettercap
  • Use Dsniff
  • Explore Cain and Abel

Lab 12: Snort IDS

  • Install Snort IDS
  • Configure Eagle X IDS
  • Configure Rule to Ignore Hosts in Snort

Lab 13: Forensic Analysis

  • Examine an IIS Event Log and Identify Common
  • Use CurrPorts to Identify Anomalies
  • Use Jotti for Forensic Analysis

Lab 14: Business Continuity Plan

  • Identify When a Disaster Has Occurred
  • Determine Key Assets
  • Identify Potential Controls

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

Sexe:
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.