Cyber Security Essentials (CSE)

Course Information

  • Duration: 3 Day / 32 Hours
  • Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
  • Who Should Attend: Network Engineer, System Analyst, CSO, CISO, Software Engineer, Technologist, System Engineer, IT Professionals and Anyone seeking to acquire essential knowledge on Cyber Security

Course Objective

Cyber Security Essentials (CSE) is designed for anyone interested in acquiring the essential knowledge and skills required for defend their organization against any Cyber Threats.

Pre-Requisite

NA.

Examination

Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered

Module 1 CYBER SECURITY IN THE REAL WORLD

  • Introduction to Cyber Security
  • Hacking in the Real World

  • Module 2 Introduction to Ethical Hacking

  • Introduction to Ethical Hacking
  • How Ethical Hacking Enhances Security

  • Module 3 Fundamental of Networking

  • OSI & TCP/IP
  • MAC Address
  • IPv4 & IPv6
  • Types of Network and Topologies
  • Understanding Network Services and Protocols
  • Understanding Network Devices
  • Introduction to Network Media
  • Understanding Ports
  • Network Troubleshooting Command
  • Network Troubleshooting Concepts

  • Module 4 Introduction to Virtualization

  • What is Virtualization?
  • Benefits of Virtualization
  • Hypervisor
  • Common Security Issues with Virtual Machines

  • Module 5 Fundamentals of Cloud Computing

  • What is Cloud Computing?
  • Benefits of Cloud Computing
  • Types & Services of Cloud Computing
  • Security Issues with Cloud Computing

  • Module 6 Shodan Search Engine

  • introduction to Shodan
  • How to Use Shodan
  • Explore Vulnerable Services and Servers
  • Gain Access to Smart Devices

  • Module 7 Google Hacking Database (GHDB)

  • Introduction to GHDB/Google Dorks
  • Finding Bugs
  • Information Gathering

  • Module 8 How to Build a Lab to Hack Safely

  • Precautions Before to Start Hacking
  • Configure Lab for Hack Safely

  • Module 9 Essential Security Tools

  • Introduction to Open-source Security Tools
  • Nmap
  • Zenmap
  • Wireshark

  • Module 10 Essential Security Technologies

  • HTTP & HTTPS
  • SSL & TLS
  • Firewall and its Types
  • IPS & IDS
  • Antivirus
  • VPN
  • Proxy Servers
  • Endpoint Protection
  • Honeypot
  • DMZ

  • Module 11 Important Hacking Concepts

  • What is Zero-day Attack or Vulnerability
  • Exploit
  • Vulnerability
  • Payload

  • Module 12 Introduction to Malwares

  • Virus
  • Worms
  • Adwares
  • Spywares
  • Rootkit
  • Trojan

  • Module 13 Different Phases of Hacking

  • Reconnaissance
  • Scanning
  • Gaining Access.
  • Maintain Access
  • Clearing Tracks

  • Module 14 Overview on Information Security

  • Fundamentals of Information Security
  • Common Challenges in Information Security
  • Data Classification
  • Industrial Espionage
  • Non-repudiation

  • Module 15 Understanding Risk Management

  • What is Risk?
  • Risk Assessment
  • Managing Risk
  • Asset Identification

  • Module 16 Common Methods of Attack

  • DoS & DDoS Attacks
  • Password Attacks
  • System Attacks
  • Network Attacks
  • Website Attacks
  • Man in the Middle Attack
  • DNS Hijacking
  • Web Based Attacks

  • Module 17 Wireless Security

  • Bypassing WEP
  • Bypassing WPA/WPA2

  • Module 18 Countermeasures