Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
5G TECHNOLOGIES
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS
Forms
INTERNET OF THINGS (IoT)
IP, ETHERNET, MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SDN NFV / DATA CENTRE TECHNOLOGIES
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

Practical Masterclass – Cyber Security Fundamentals

Share this page on:

Duration and Training Format

4 Days with Practical Hands-on sessions

Course Overview:

This course provides insights into the modern day security environment and the attacker’s state of mind, including how attackers work, what tools they use, what vulnerabilities they target at and what they’re really after. It is a very unique Cyber-security course that looks into a variety of threats, vulnerabilities, and security loopholes that may be existing today and which may lead to very undesirable or compromised positions such as identity thefts, extortion attempts, or loss of valuable data or information. By attending this course, participants will learn how to use offensive security tools for defense purposes.  This is to protect the business and ensure business continuity.

Who should attend?

High level Managers, Presale Managers, IT Managers, QA and Technical Support.

Prerequisites:

Basic Knowledge of IP Networking.

Course Content:

  • Introduction to Cyber Security
  • Basics of Security Management
  • TCP/IP Vulnerabilities
  • Introduction to Cryptography
  • MiTM challenge and confidentiality solutions
  • Inspection Tool/ Hands-on Part 1
  • Wrap-up and exercises
  • Firewall
  • IP Tables Firewall
  • Network and Vulnerabilities Scanning
  • Network Scanning – Hands-on Session
  • Kali Linux
  • Inspection Tool/ Hands-on Part 2
  • Wrap-up and exercises
  • Services inspection – Hands-on
  • Penetration Testing
  • Network Penetration – DEMO Session
  • Wireless Network penetration –  Hands-on Session
  • Certificates and Authentication process
  • Part 1 Summary and Exam
  • Cloud Security
  • Firewall – Hands-on Session
  • Build your own Pen Test Lab – Hands-on
  • Session Border Controller (SBC)
  • Web Application Vulnerabilities
  • Web Vulnerabilities- Hands-on
  • Computer forensics
  • Security Summary

Related Course Topics

5G Security Overview Duration and Training Format 2 days, Instructor-led Training   Introduction Full deployment of 5G will happen very soon, probably in 2020. Expectations are high, as are security concerns. Significantly more devices and increased use of ...
An Overview of Cyber Security Course Objectives: Upon completion, participants will be able to: Describe the principal types of security threat which individual computer users, governments, SMEs and large corporations are exposed to; Describe the strengths and weaknesses of def...
Cyber Fundamentals Training with Hands-On Labs Course Overview: The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment. It seeks to explain the cyber threat landscape and attackers' mentality, inclu...
Cyber Fundamentals with Hands-On Labs Course Overview: This cyber fundamental course covers basic cybersecurity topics. The main goal of this cyber fundamental course is to provide an insight on the modern security environment, the cyber threat landscape and the attacker's mentality. T...
Internet of Things (IoT) Security Workshop Duration and Training Format: 3-day instructor-led training Course Overview The central role that IoT plays in the technology world and the growth of IoT devices is an undeniable fact. IoT is bringing the network to our daily lives - our cars, ...

Contact Us

  • This field is for validation purposes and should be left unchanged.
Telefocal Asia © All rights reserved.

Setup Menus in Admin Panel

Skip to toolbar