Course Outline
This course equips professionals with the essential knowledge and skills to navigate the complex world of cybersecurity. Participants will delve into three key modules, each focusing on critical aspects of cybersecurity, ensuring that participants are provided with the practical skills to protect their organizations’ digital assets and mitigate cyber risks effectively.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
The Cybersecurity World and Crime
- The need for cybersecurity
- The impact of cyber threats on business
- Ensuring cybersecurity
- Recent cyber attacks with critical consequences on businesses
- How AI Changes the game of cybersecurity
- Common Cyber Security Threats: DoS/DDoS, brute force, MITM, social engineering, phishing, and spear phishing
- Malware types: ransomware, trojan, virus, worm, adware
- Blue and Red Teams
Attackers and APTs
- Attacker types: Cyber terrorists, industrial spies, insiders, hacktivists, cybercriminals
- Exploits, vulnerabilities, zero-day attack, payload, and RAT
- Advanced Persistent Threats: APT goals, stages, famous groups, case studies, and warning signs
- The cyber kill chain stages
- Types of hackers
- Ethical hacking (Red Team and Bug Bounty)
Mitigating The Risk & Taking Control
- Business Impact Analysis and Risk Assessment
- NIST and MITRE Frameworks
- Valuable data types and data protection standards: PII, PCI, PHI
- Enforcement of strong passwords
- Risk management processes
- CIA triad
- Practicing risk management—real-world examples
Prerequisites
- Basic computer literacy and familiarity with using the internet.
- Interest in cybersecurity and a desire to learn about cybersecurity principles and practices. (No prior cybersecurity knowledge or experience is required, as the course will cover foundational concepts).