CYB300 Cyber Security Awareness
Rated 3.5/5 based on 11 customer reviews

CYB300 Cyber Security Awareness

Available: In Stock
$499.00

Image

Course Overview

CYB300 - Cyber Security Awareness introduces students to fundamental issues faced by cybersecurity professionals.
Beginning with the identification and definition of vulnerabilities, malware and hacker methodology, this two-day course proceeds to explain appropriate defenses and mitigation processes to secure and defend information systems

 

Objectives

Provide detailed-discussion & hands-on practical application in the identification/classification of vulnerabilities & malware; explanation of the hacker threat & methodology & explore best-practice procedures & processes associated with security appliances & application.

Target Audience

Professionals seeking a fundamental understanding of cyber security issues, appropriate defense measures & industry-recommended mitigation processes.



Estimated Course Length: 24 hours

Vulnerabilities & Malware introduces students to the types of vulnerabilities and malware that are prevalent in today’s cyber security landscape

Topics List
  • Types of Vulnerabilities
  • Types of Malware

Hacker Methodology & Threats provides background information regarding ways hackers exploit networks and networked devices. Discussions also include topics related to various threat actors like social engineers and insiders, and the various techniques these threat actors use to solicit information and/or damage/disrupt information systems

Topics List
  • Hacker Methodology & Mindset
  • Social Engineering & Insider Threat
  • Physical Security Threat

Scanning & Assessment provides an overview of the various types of network and host-based scans required to assess and enumerate information systems, as well as, to aide in the identification of vulnerable services/applications.

Topics List
  • Network Scanning
  • Vulnerability Assessment

Defense in Depth introduces students to industry “best-practices” detailed through the implementation of a multi-pronged defense posture.

Topics List
  • Defense Mechanisms
  • Introduction to Intrusion
  • Detection/Prevention Systems
  • Security Logs
  • Personal Security Products
  • Password Mechanisms
  • Application Security

Security Responsibilities & the Future of Cyber Security examines the different security responsibilities levied on an organization. These responsibilities include those outlined by local, state and federal law, as well as, those responsibilities which come as a result of adherence to industry guidelines or internal policies, processes and procedures.

Topics List
  • Security and Responsibilities
  • Digital Forensics Basics
  • Future Trends in Cyber Security

Course Overview

CYB300 - Cyber Security Awareness introduces students to fundamental issues faced by cybersecurity professionals.
Beginning with the identification and definition of vulnerabilities, malware and hacker methodology, this two-day course proceeds to explain appropriate defenses and mitigation processes to secure and defend information systems

 

Objectives

Provide detailed-discussion & hands-on practical application in the identification/classification of vulnerabilities & malware; explanation of the hacker threat & methodology & explore best-practice procedures & processes associated with security appliances & application.

Target Audience

Professionals seeking a fundamental understanding of cyber security issues, appropriate defense measures & industry-recommended mitigation processes.



Estimated Course Length: 24 hours

Vulnerabilities & Malware introduces students to the types of vulnerabilities and malware that are prevalent in today’s cyber security landscape

Topics List
  • Types of Vulnerabilities
  • Types of Malware

Hacker Methodology & Threats provides background information regarding ways hackers exploit networks and networked devices. Discussions also include topics related to various threat actors like social engineers and insiders, and the various techniques these threat actors use to solicit information and/or damage/disrupt information systems

Topics List
  • Hacker Methodology & Mindset
  • Social Engineering & Insider Threat
  • Physical Security Threat

Scanning & Assessment provides an overview of the various types of network and host-based scans required to assess and enumerate information systems, as well as, to aide in the identification of vulnerable services/applications.

Topics List
  • Network Scanning
  • Vulnerability Assessment

Defense in Depth introduces students to industry “best-practices” detailed through the implementation of a multi-pronged defense posture.

Topics List
  • Defense Mechanisms
  • Introduction to Intrusion
  • Detection/Prevention Systems
  • Security Logs
  • Personal Security Products
  • Password Mechanisms
  • Application Security

Security Responsibilities & the Future of Cyber Security examines the different security responsibilities levied on an organization. These responsibilities include those outlined by local, state and federal law, as well as, those responsibilities which come as a result of adherence to industry guidelines or internal policies, processes and procedures.

Topics List
  • Security and Responsibilities
  • Digital Forensics Basics
  • Future Trends in Cyber Security