CYBERSECURITY NEWS

MMSCYBER003: Basics of Cyber Security (3 Days)

 

Course Description

This course is designed for users who understand the general concepts of information technology and are looking to expand their knowledge in cyber security. With a rising threat of cyber-attacks, this course will heavily emphasize on strengthening your cyber-environment and securing sensitive information. Principles will be discussed and integrated with interactive labs to give a foundation of understanding how to stay protected, mitigate risks, use networking tools and protocols, and more.

This course highlights the basic concepts and students will gain knowledge on aspects of Cyber Security: CIA Triad, Principle of Least Privilege, the importance of password strength, Wireless Security, various types of viruses, Compliance and Documentation. This will provide information on principles and practices commonly used throughout the industry.

After completing this course, students will be able to:

  • Recognize basic network security devices
  • Use multiple network traffic tools
  • Understand Wireless Security
  • Enforce Web and Browser Security
  • Recognize secure communication via encryption/cryptography
  • Identify common viruses
  • Manage Operating System (OS) Security
  • Utilize password strengthening and management tools
  • Follow security compliance and complete documentations

Course Outline

Module One: Course Introduction

  1. Risk
  2. Cyber Attacks
  3. Confidentiality, Integrity, Availability (CIA Triad)
  4. Principle of Least Privilege
  5. Course overview
  6. Learning Objectives

Module Two: Introduction to Networks       

  1. Network Basics
  2. Open Systems Interconnection Model (OSI Model)
  3. Different topologies
  4. MPLS
  5. Types of Networks
  6. Network Protocols
  7. Advantages of Networks

Module Three: Network Security Devices

  1. Firewalls
  2. Role of firewalls in Network Security
  3. Types of Firewalls
  4. Planning to use security devices
  5. How to configure network devices such as routers and firewalls
  6. Protecting Networks
  7. Types of Security
  8. Flavors and brands Available
  9. How to protect against Attacks

Module Four: Network Traffic and Analysis

  1. How to identify hostile entities

Module Five: Internet / Web Security

  1. Browser Choice
  2. Protecting web servers

Module Six: Secure Communication 

  1. Cryptography/Encryption
  2. Classic Cryptography
    • Exercise: Encryption/Cryptography
  3. Symmetric Cryptography
  4. Public Key Cryptography
  5. Cryptanalysis
  6. PKI
  7. Steganography

Module Seven: Viruses    

Module Eight: Operating System (OS) Security       

  1. OS Security Basics
  2. Active Directory
    • Demonstration: Active Directory
  3. BitLocker
  4. AppLocker
    • Demonstration: AppLocker
  5. UAC (User Account Control)
    • Demonstration: User Account Control (UAC)
  6. Improving Security of Linux/Unix Systems

Module Nine: Password Management and Strength 

  1. Password Recovery /Cracking Tools (Windows and Unix)
    • Linux Password Cracking
  2. Password management and strength

Module Ten: Wireless Security          

Module Eleven: Compliance and documentation      

  1. Policy basics
  2. Six Steps of incident handling

Module Twelve: Course Close out    

  1. Today’s IA threats
  2. How to Mitigate 95% of security risks
  3. Recommended Reading
  4. Questions and Answers