Cyber Security Basics: A Hands-on Approach Training Logo

Cyber Security Basics: A Hands-on Approach Training

Live Online & Classroom Enterprise Training

Learn how to think like a hacker, but behave as a security expert.

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is Cyber Security Basics: A Hands-on Approach Training about?

This computer science course introduces cyber security, showing different aspects of this discipline. You will learn the main existing cyber security threats and how to protect yourself against them. The course presents a practical approach in which all required material will be provided to allow you to understand attacks better and establish appropriate countermeasures. 

What are the objectives of Cyber Security Basics: A Hands-on Approach Training ?

  • Basic selection of CSS properties 
  • Cyber security landscape 
  • Reverse engineering 
  • Managing and monitoring network cyber security attacks 
  • Computer forensics 
  • Malware and advanced persistent threats 
  • Vulnerability management and pen testing 

Who is Cyber Security Basics: A Hands-on Approach Training for?

  • Students who are interested in learning both theory and hands-on skills in cybersecurity 
  • Software developers who are interested in improving the security of their programs 
  • Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields 

What are the prerequisites for Cyber Security Basics: A Hands-on Approach Training?

 computer networks and operating systems

Available Training Modes

Live Online Training

8 Hours

Self-Paced Training

8 Hours

Course Outline Expand All

Expand All

  • This lecture introduces the impact of cybersecurity nowadays, as well as some examples of cyber threats that motivate the relevance of this area of study. Types of cyber threats, such as cybercrime or cyberwarfare, are later described, with an overview of the current cyber threat landscape. Finally, some well-known cybersecurity events are presented.
  • This lecture introduces computer forensics, the technique focused on analysing and preserving evidence in a particular computer device after an attack occurs. Typical forensic traces are defined, namely traces left by deleted files, confidential data, and fake emails.
  • This lecture introduces the main concepts of reverse engineering: the ability to take an executable element and figure out how it works. The definition of this technique is introduced. After some theoretical knowledge, examples of disassembling C and decompiling codes in different languages, namely Java and C, are presented.
  • This lecture introduces the main concepts of cyber defence and commonly applied tools. After presenting this topic, firewalls are outlined. The following part involves the description of Intrusion Detection Systems (IDSs). Security Information and Event Management (SIEM) systems, which refer to a general approach to managing cyber defence, are finally presented.
  • This lecture explains the main concepts related to malware and Advanced Persistent Threats (APTs) and the main techniques for their identification. The definition and types of malware, APTs and some actual cases are introduced.
  • This last lesson presents vulnerability description and management. It describes and gives examples of the most common software, network, and web vulnerabilities. The definition, use and application of penetration testing (pen-testing) are also presented, as well as some examples of applying the well-known tool Metasploit. Repositories of vulnerabilities are finally introduced.

Who is the instructor for this training?

The trainer for this Cyber Security Basics: A Hands-on Approach Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Reviews