Featured
Cyber Fundamentals with Hands-on Labs
Category:

Course Overview
This course is designed to help those without prior Cyber Security knowledge or experience to understand the fundamentals of Cyber Security. The topics covered in this course include Cyber Security terminologies, the basics of computer networks, cryptographic principles, penetration testing, and more.
The course will enable participants to gain insights into the modern security environment, particularly the cyber threat landscape and attackers’ mentality. Participants will be able to learn how attackers work, what tools they use and what vulnerabilities they target.
The hands-on sessions aim to help participants better grasp the information even if they are new to some of the topics. Workstations will be equipped with Wireshark.
Target Audience
- High-level Managers
- Pre-sales Managers
- IT Managers
- QA and Technical Support Managers
Duration & Training Format
Instructor-Led Training
[Classroom: 5 days / LIVE Virtual*: 35 hours]
[Classroom: 5 days / LIVE Virtual*: 35 hours]
*Note:
- A minimum of 6 or more participants are required for a company-based LIVE Virtual course to commence
- LIVE Virtual courses can be conducted for 5 hours or 7 hours daily. Please note that the number of training days will be extended if you opt for 5 hours daily.
Upcoming Course Dates
7 – 11 Nov 2022 (Mon – Fri), GMT +08:00
If you are keen on attending the above scheduled course, please register your interest via our course enquiry form.
Key Benefits
For High-level Managers,
- Lead and manage meetings related to Cyber Security threats
- Conduct discussions regarding cyber risk management within the organization with IT personnel
- Be able to recruit highly skilled Cyber Security personnel
For Pre-sales Managers,
- Capture your customers’ needs and concerns regarding cybersecurity aspects of integrating your products into the customers infrastructure
- Present and discuss the security aspects of proposed technological products and solutions with your customers
- Interact with potential customer with knowledge and integrity regarding security aspects of products
- Knowledge of the cyber security buzzwords and topics
For Technical Support Managers,
- Communicate with confidence Cyber Security topics, terms, and concepts
- Understand computer network basics and fundamental grasp of networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
- Discuss various security technologies related to products with customers
Course Objectives
At the end of the course, participants will be able to:
- Identify threats and cyber attacks
- Defend against various attacks using appropriate technological means that will be presented during the course
- Train teams and colleges at work on cautious behavior against cyberattacks
- Utilise various tools to check network weaknesses and vulnerabilities
Course Outline
- Introduction to Cyber Security
- Basics of Networking
- OSI Layer Model
- The Physical Layer and Vulnerabilities
- Data Link Layer (IEEE Ethernet) – the Second Layer
- The Third Layer and IP Vulnerabilities
- The Fourth Layer – Transportation Layers
- Inspection and Interception Tool – Hands-On
- Internetworking
- Inspection and Interception Tool – Hands-On
- Basics of Security Management
- Applications Evolution and Security Issues
- MiTM Challenge and Confidentiality Solutions
- Virtual Machines – Hands-On
- Kali Linux – Hands-On
- Inspection and Interception Tool – Hands-On
- Basic Linux Commands
- Offensive Security: Kali Linux
- Linux CLI Hands-On
- Network Scanning
- NMAP – Hands-On
- Maltego – Demo
- OpenVAS for Vulnerabilities Scanning
- OpenVAS – Demo
- Firewall
- IPTables Firewall
- Firewall – Hands-On
- Introduction to Cryptography
- Symmetric Cryptography
- Asymmetric Cryptography
- Certificates and Authentication Process
- Penetration Testing
- Penetration Testing (Cont’d)
- Network Penetration – Demo
- Wireless Network Penetration
- Wireless Network Penetration – Demo
- SQL Injection – Demo and Hands-On
- Cyber Security in the Organization
Pre-requisites
NIL
Testimonials
“Real life examples of how hackers work and the details given for IP packet analysis were good. I now know how to look into the network vulnerabilities.”

M1 Limited
Related Courses
Christine Chua
This course will address what cyber security is, why it is essential, and the various solutions that telecom professionals and telcos can adopt to ...
Virtual Training
Classroom/LIVE Virtual: 1 day
Add to Wishlist
Free
Christine Chua
This course will discuss 5G security in three key areas with a high-level perspective.
Virtual Training
Classroom/LIVE Virtual: 1 day
Add to Wishlist
Free
Yunqi Ye
This course utilizes the Open Source srsRAN tool to discuss methodical approaches of installation and troubleshooting across the LTE E-UTRAN.
Virtual Training
Classroom: 3 days / LIVE Virtual: 21 hours
Add to Wishlist
Free
Add to Wishlist
Enrolled:
0 students
Duration:
Classroom: 5 days / LIVE Virtual: 35 hours
Level:
Virtual Training