Cyber Security Essentials (CSE)

Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase. Cyber Criminals are also increasing in capabilities and taking advantage of the lack of pace in the release of security software patches and updates due to the continuous adoption of new technologies like the Internet of Things (IOT).

Upcoming Batches

  • Singapore: 27 to 29 Oct 2018, 23 to 25 Nov 2018, 7 to 9 Dec 2018 | Book Now
  • Bangkok, Thailand: 19 to 21 Dec 2018 | Book Now
  • Johor, Malaysia: 12 to 14 Dec 2018 |  Book Now.
  • Kuala Lumpur, Malaysia: 15 to 17 Oct 2018, 3 to 5 Dec 2018 |  Book Now
Course Objective
Cyber Security Essentials (CSE) is aimed to provide participants with the fundamental knowledge of Cyber Security and Network Security. Through real-time demonstration on scenario based hands-on exercises, Participants will be able to experience first-hand different types of attacks. Essential concepts on networking and security will also be covered allowing participants to gain in-depth knowledge on Cyber Security.
Course Duration
24 hours / 3-Days
Course Outline
MODULE 1: Cyber Security in the Real World

  • Introduction to Cyber Security
  • Hacking in the Real World
  • MODULE 2: Introduction to Ethical Hacking  

  • What is Ethical Hacking
  • How Ethical Hacking Enhances Security
  • MODULE 3:Fundamentals of Networking  

  • OSI & TCP/IP
  • MAC Address
  • IPv4 & IPv6
  • Types of Network and Topologies
  • Understanding Network Services and Protocols
  • Understanding Network Devices
  • Introduction to Network Media
  • Understanding Ports
  • Network Troubleshooting Command
  • Network Troubleshooting Concepts
  • MODULE 4: Introduction to Virtualization  

  • What is Virtualization?
  • Benefits of Virtualization
  • Hypervisor
  • Common Security Issues with Virtual Machines
  • MODULE 5:Fundamentals of Cloud Computing  

  • What is Cloud Computing?
  • Benefits of Cloud Computing
  • Types & Services of Cloud Computing
  • Security Issues with Cloud Computing
  • MODULE 6: Shodan Search Engine

  • introduction to Shodan
  • How to Use Shodan
  • Explore Vulnerable Services and Servers
  • Gain Access to Smart Devices
  • .MODULE 7: Google Hacking Database (GHDB)

  • Introduction to GHDB/Google Dorks
  • Finding Bugs
  • Information Gathering
  • MODULE 8:How to Build a Lab to Hack Safely

  • Precautions Before to Start Hacking
  • Configure Lab for Hack Safely
  • MODULE 9:Essential Security Tools

  • Introduction to Open-source Security Tools
  • Nmap
  • Zenmap
  • Wireshark
  • MODULE 10:Essential Security Technologies

  • SSL & TLS
  • Firewall and its Types
  • IPS & IDS
  • Antivirus
  • VPN
  • Proxy Servers
  • Endpoint Protection
  • Honeypot
  • DMZ
  • MODULE 11:Important Hacking Concepts

  • What is Zero-day Attack or Vulnerability
  • Exploit
  • Vulnerability
  • Payload
  • MODULE 12: Introduction to Malwares

  • Virus
  • Worms
  • Adwares
  • Spywares
  • Rootkit
  • Trojan
  • MODULE 13: Different Phases of Hacking

  • Reconnaissance
  • Scanning
  • Gaining Access.
  • Maintain Access
  • Clearing Tracks
  • MODULE 14: Overview on Information Security

  • Fundamentals of Information Security
  • Common Challenges in Information Security
  • Data Classification
  • Industrial Espionage
  • Non-repudiation
  • MODULE 15: Understanding Risk Management

  • What is Risk?
  • Risk Assessment
  • Managing Risk
  • Asset Identification
  • MODULE 16: Common Methods of Attack

  • DoS & DDoS Attacks
  • Password Attacks
  • System Attacks
  • Network Attacks
  • Website Attacks
  • Man in the Middle Attack
  • DNS Hijacking
  • Web Based Attacks
  • MODULE 17: Wireless Security

  • Bypassing WEP
  • Bypassing WPA/WPA2
  • MODULE 18: Countermeasures
    MODULE 19: Hands-On and Discussion on Real Case Scenarios
    Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered
    Participants will be recognised as a CASUGOL CERTIFIED PROFESSIONAL and be awarded a Certificate of Competency in Cyber Security Essentials (CSE) upon meeting the requirements and passing the examination.
    Who Will Benefit from the Course
    Cyber Security Essentials (CSE) is designed for participants who are interested in pursuing a career in the areas of Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.

    This course will equip you with a set of skills that you can draw on to implement the technology in your organisation.

    Class is limited to 20 participants as hands-on sessions and real-time demonstration is expected.