Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
5G TECHNOLOGIES
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS
Forms
INTERNET OF THINGS (IoT)
IP, ETHERNET, MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SDN NFV / DATA CENTRE TECHNOLOGIES
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

Cyber Fundamentals Training with Hands-On Labs

Share this page on:

Course Overview:

The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment.

It seeks to explain the cyber threat landscape and attackers’ mentality, including how attackers work, what tools they use, what vulnerabilities they target and what they are really after.

This course is targeting those with a basic knowledge of computers and technology and with no prior cyber security experience. It covers a wide range of baseline topics, including terminology, the basics of computer networks, cryptographic principles,penetration testing and more.

The hands-on sessions will enable you to grasp the information presented even if some of the topics are new to you. You’ll learn the fundamentals of cyber security that will serve as the foundation of your security skills and knowledge. Workstations equipped with Wireshark will be used for the hands-on labs.

Who Should Attend?

High level Managers, Presale Managers, IT Managers, QA and Technical Support

Course Duration:

3-days instructor-led training event

Prerequisites:

Basic Knowledge of IP Networking

Special Note for this course:

Workstations are used for hands-on. A workstation per every 2 attendees (12 attendees recommended in a class, max. of 20 attendees in the class)

What are the course benefits?

This course is targeting those with a basic knowledge of computers and technology but with no prior cyber security experience.

It covers a wide range of baseline topics, including terminology, the basics of computer networks, cryptographic principles, penetration testing and more.

The hands-on sessions will enable you to grasp the information presented even if some of the topics are new to you.

You’ll learn fundamentals of cyber security that will serve as the foundation of your security skills and knowledge.

In General

  • Managers who feel bombarded with complex technical security terms they don’t understand, but want to understand
  • “Non IT” security managers who want to be able to communicate with other personal about cybersecurity as part of the overall security plan of the organizations
  • Anyone new to cyber security and in need of an introduction to the fundamentals of security
  • Professionals with basic computer and technical knowledge in all disciplines who need to be conversant in basic security concepts, principles, and terms without going too deep

High-Level Managers:

  • Lead and manage meeting regarding cyber security threats
  • Conduct discussion and debates with your IT personal regarding cyber risk management within your organization
  • Be able to recruit highly-skilled security personal

Sales/Presale Managers

  • Capture your customers’ needs and concerns regarding cybersecurity aspects of integrating your products into the customers infrastructure
  • Present and discuss the security aspects of proposed technological products and solutions with your customers
  • Interact with potential customer with knowledge and integrity regarding security aspects of products
  • Knowledge of the cyber security buzzwords and topics

Technical Support Managers

  • Communicate with confidence regarding information security topics, terms, and concepts
  • Understand computer network basics and fundamental grasp of networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
  • Discuss various security technologies related to products with your customers

Course Outlines:

  • The Cyber Security Landscape
  • Basics for Security Management
  • Security Standards
  • TCP/IP Review
  • Inspection Tool – Hands-on
  • Introduction to Cryptography
  • Certificates and Authentication process
  • Data Securing Models
  • MiTM challenge and confidentiality solutions
  • Wireshark for Interception – Hands-on
  • Firewall
  • IPTable Firewall
  • Kali Linux
  • Penetration Tests
  • Services inspection – Hands-on
  • Anonymous users
  • NMAP- Network Scanning
  • Firewall – Hands-on Session
  • Network Scanning – Hands-on Session
  • WPA2 crack – Hands-on Session
  • Security Summary

Related Course Topics

5G Security Overview Duration and Training Format 2 days, Instructor-led Training   Introduction Full deployment of 5G will happen very soon, probably in 2020. Expectations are high, as are security concerns. Significantly more devices and increased use of ...
An Overview of Cyber Security Course Objectives: After attending this "An Overview of Cyber Security" training, participants will be able to: Describe the principal types of security threat which individual computer users, governments, SMEs and large corporations ar...
Internet of Things (IoT) Security Workshop Duration and Training Format: 3-day instructor-led training Course Overview The central role that IoT plays in the technology world and the growth of IoT devices is an undeniable fact. IoT is bringing the network to our daily lives - our cars, ...
LTE Security Course Overview: This "LTE Security" course is designed to enable participants understand the security issues surrounding LTE networks. It will list and explain in-depth the various encryption algorithms used in LTE networks so that the participants...
Mobile Network Vulnerabilities & Pentesting Course Objectives: This workshop aims at introducing penetration testing methods and principles for Sigtran/MAP-based signaling systems in mobile networks. During the course participant will gain insight into the signaling protocol related networ...

COURSE ENQUIRY

BASIC TRAININGS FOR PROFESSIONALS

    IP, ETHERNET, MPLS / TRAFFIC ENGINEERING

      NETWORK SECURITY

        SDN NFV / DATA CENTRE TECHNOLOGIES

          DATA ANALYTICS

            IPTV, OTT MEDIA TECHNOLOGIES

              Business & Project Management

                CERTIFICATION PROGRAMMES

                  5G Technologies

                    LTE / 4G Technologies

                      INTERNET OF THINGS (IoT)

                        SIP / IMS / ROAMING

                          TRANSMISSION TECHNOLOGIES

                            FIBER OPTICS COMMUNICATIONS

                              Network QoS & Optimization

                                NETWORK OPERATIONS & SUPPORT

                                  top
                                  Telefocal Asia Pte Ltd © www.telefocal.com. All rights reserved.
                                  Website Terms & ConditionsPrivacy Statement

                                  Setup Menus in Admin Panel