Cyber Security Essentials (CSE)

Register Here
Online Session: 9:30am to 5:30pm (SGT / UTC +8) 3 Lessons Click on preferred date to register

Course Information

  • Duration: 3 Day / 24 Hours
  • Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
  • Who Should Attend: Network Engineer, System Analyst, CSO, CISO, Software Engineer, Technologist, System Engineer, IT Professionals and Anyone seeking to acquire essential knowledge on Cyber Security

Course Objective

Cyber Security Essentials (CSE) is designed for anyone interested in acquiring the essential knowledge and skills required for defend their organization against any Cyber Threats.

Pre-Requisite

NA

Examination

Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered
Module 1 Cyber Security in The Real World
Topics Covered
  • Introduction to Cyber Security
  • Real World Hacking
  • Introduction to Ethical Hacking
  • Ethical Hacking to Enhance Security

Module 2 Fundamental of Networking
Topics Covered
  • OSI & TCP/IP Model
  • IP Addressing
  • Types of Network and Topologies
  • Network Services and Protocols
  • Network Devices and Media
  • Network Troubleshooting

Module 3 Virtualization & Cloud Computing
Topics Covered
  • Benefits of Virtualization
  • Types of Virtualization
  • Common Security Issues of VM
  • Benefits of Cloud Computing
  • Types & Services of Cloud Computing
  • Security Issues with Cloud Computing

Module 4 Shodan and GHDB
Topics Covered
  • Introduction to Shodan
  • Explore Vulnerable Services and Servers
  • Introduction to GHDB/Google Dorks
  • Finding Bugs and Vulnerable Targets

Module 5 Build a Cyber Security Practice Lab
Topics Covered
  • Checklist for Cyber Security Lab
  • ISO and VM Lab
  • Configure Lab for Hacking Safely
  • Vulnerable VM Configuration
  • Open-source Security Tools

Module 6 Essential Security Technologies
Topics Covered
  • SSL & TLS
  • Firewall, UTM, IPS & IDS
  • Antivirus & Endpoint Protection
  • VPN & Proxy
  • Honeypot & DMZ

Module 7 Attack Types
Topics Covered
  • DoS & DDoS
  • Sniffing & Spoofing
  • System & Network
  • Web Based Attacks
  • Man in the Middle
  • Zero Day Attacks
  • DNS Hijacking

Module 8 Malware Family
Topics Covered
  • Virus & Worms
  • Rootkit & Trojan
  • Botnets & Zombie Network
  • Ransomware
  • Adwares & Spywares

Module 9 Phases of Hacking
Topics Covered
  • Information Gathering
  • Scanning
  • Gaining Access
  • Maintain Access
  • Clearing Tracks

Module 10 Information Security / Wireless Security
Topics Covered
  • Common Challenges
  • Data Classification
  • Non-repudiations
  • Risk Assessment
  • Managing Risk
  • Wireless Fundamentals
  • Rough Access Point
  • Bypassing WPA / WPA2