Courses

Cyber Security Essentials

Cyber Security Essentials by Cyber Security Zone is designed to equip beginners with the foundational knowledge and skills needed to embark on a career in cyber security. This course covers the basic concepts, tools, and practices that are critical for safeguarding information and assets in the digital world. Through interactive learning modules, practical exercises, and real-world scenarios, students will learn how to identify potential threats, protect against cyber attacks, and understand the importance of cyber security in today’s technology-driven society.

Target Audience: Fresh students wanting to start a career in cybersecurity.

  • Equip students with fundamental cybersecurity knowledge and skills.
  • Build a strong foundation for further cybersecurity studies and certifications.
  • Raise awareness about cyber threats and how to protect oneself and others online.

This course is suitable for:

  • Students interested in pursuing a career in cybersecurity.
  • IT professionals looking to transition into the field of cybersecurity.
  • Security enthusiasts seeking to enhance their knowledge and skills.
  • Individuals responsible for information security within organizations.
  • Anyone interested in understanding the basics of cybersecurity for personal or professional growth.

The Cyber Security Essentials course is delivered through a combination of:

  • Interactive lectures presented by industry experts.
  • Hands-on lab exercises and practical demonstrations.
  • Case studies and real-world scenarios for enhanced learning.
  • Quizzes and assessments to reinforce understanding.
  • Access to resources, reference materials, and online forums for discussion.

Module 1: Information Security

Lessons:

  • What is Security
  • Confidentiality, Integrity and Availability triad
  • Privacy
  • Non-Repudiation
  • Types of Attacks
  • Threats, Vulnerabilities and Risk
  • Risk Management

Review Questions

Module 2: Identification, Authentication and Authorisation

Lessons:

  • Identification
  • Authentication
  • Password and Multifactor Authentication
  • Biometrics
  • Authorization

Review Questions

Module 3: Access Control

Lessons:

  • Access Control Lists (ACLs)
  • Access Control Models and Methodologies
  • Discretionary Access Control
  • Mandatory Access Control
  • Role-based Access Control

Review Questions

Module 4: Law and Compliance

Lessons:

  • Laws and Regulations
  • Compliance (Regulatory & Industry Compliance)

Review Questions

Module 5: Fundamentals of Encryption

Lessons:

  • The History of Encryption
  • Modern Encryption Methods
  • Windows and Linux Encryption
  • Hashing

Review Questions

Labs:

  • Enabling BitLocker
  • Encrypting a Folder Using EFS
  • Use HashGenerator to generate hashes
  • Use Ophcrack to crack password hashes

Module 6: Network Infrastructure and Security

Lessons:

  • IP Protocols
  • Management Protocols
  • Routers and Switches
  • Firewalls
  • Firewall Implementation
  • Proxy Servers
  • Windows Firewalls
  • Linux Firewalls
  • Wireless Security
  • Mobile Device Security
  • Network Security Tools

Review Questions

Labs:

  • Configuring Windows Firewall
  • Configuring iptables Rules

Module 7: Microsoft Windows Infrastructure

Lessons:

  • Active Directory Domain Services
  • Group Policy Objects
  • Configuring Windows
  • Windows Update

Review Questions

Labs:

  • Password Policies

Module 8: UNIX / Linux Server

Lessons:

  • Configuring Linux
  • Third Party Software Updates
  • Core Operating System updates

Review Questions

Labs:

  • Linux File Permissions
  • Disabling Linux Services

Module 9: Assessing System Security

Lessons:

  • Risk Assessment
  • Conducting an Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • Documenting Security

Review Questions

Labs:

  • Probing the Network using Nmap
  • Identify details regarding a specific vulnerability

Module 10: Application Security

Lessons:

  • Software Development Vulnerabilities
  • Buffer Overflows
  • Input Validation Attacks
  • Authentication, Authorisation and Cryptographic Attacks
  • Web Security
  • Database Security
  • Application Security tools

Review Questions

Module 11: Incident Response and Recovery

Lessons:

  • What is Incident Response
  • The Incident Response Process Model
  • Why Incident Response is needed
  • Disaster Recovery
  • Business Continuity
  • Fault Tolerance

Review Questions

Labs:

  • Backup Windows 10
  • Backup files using CPIO
  • Backup files with TAR

Upon successful completion of the course, students will receive a “Cyber Security Essentials” certification from Cyber Security Zone, signifying their foundational understanding of cyber security principles and their readiness to take the first steps in a cyber security career.

 

Navigate Our Specialized Course

Enroll Now

Personal Information
Course Selection:
Educational Background:
Experience and Skills:
Employment Information: