Course Description
The cybersecurity introduces you to the latest internet security threats and vulnerabilities and different methods of risk management. Whether you are an executive, IT professional, or IT system administrator, this training course will help you to identify any type of threats in the cyber world, assess the vulnerabilities and provide plans for managing the risks caused by these threats.
What Do Participants Learn?
- Understand the foundation and history of the cybersecurity
- Explain different types of threats and attacks in the cyber world
- Understand how to recognize the threats and classify different methods of defense
- Process the risk management techniques in networks
- Identify different types of spyware, malware or malicious codes in cybersecurity
- Understand the policies and regulations of cyber security networks
- Manage the detection and protection solution depends on the type of attack
- Identify the attackers and understand the method of hacking in different cyber secured networks
- Define types of incidents in cybersecurity
- Access additional external resources to supplement knowledge of cybersecurity
- Understand the foundation and history of the computer security
- Explain different types malware and consequences of malware to the computer security
- Understand the different classification of malware in network security
- Recognize the different types of Trojans and Worms as the most common types of malware
- Describe the exploits and their different types and consequences
- Explain the malware detection algorithms and approaches
- Understand the malware prevention studies
- Describe the incident response methodologies in case of malware attacks
- Understand the basics of human-computer interaction
- Describe the concept of computer security and requirements of a usable secured system
- Describe how users can improve or analyze the usable system security
- Develop the usable privacy concepts and differentiate them with usable security
- Design the secure interaction usable system free of threats or malware
- Understand the trust layers in usable security and design a trustworthy secured system
- Describe the authentication and password related issues in usable security and manage to control the problems
- Explain the concept of public key infrastructure (PKI) and secure communication principles and analysis methods
Who Should Attend?
- Executives working in the security area
- IT professionals
- Network engineers, security analysts, policy analysts
- Security operation personnel and network administrators
- System integrators and security consultants
- Cybersecurity professionals and computer engineers
- Security traders
- Technicians, operators and maintenance personnel in the cybersecurity area
What Will the Learning Experience Include?
Phase: 1
Introduce
- Comprehensive pre-program activities include:
- Web-based information forms & surveys completed by attendee.
- Direct consultation with the attendee about the expectations.
- During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
- Participants learn from expert trainers who have both academic and business experiences.
- Highly applicable training content & instructive activities for adding depth to training topics.
- **A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Phase: 2
Explore & Practice
Phase: 3
Apply
- Apply & sustain the learning experience by using this ongoing support:
- To ensure participant has new skills or behavior progress.
- Optional, fee-based mentoring & coaching with the trainer.
- Training materials & additional documents (e-books, pdf files, presentations and articles)
- Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
- Participant's Evaluation
- Trainer's Evaluation
Phase: 4
EVALUATE
- Introduction to Cyber Security
- Threats and Vulnerabilities
- The concept of Network and Effect of Internet in Cyber Security
- Network Attacks
- Malware in Cyber Security
- Information Assurance in Cyber Security
- Network Security
- Website Security in Presence of Cyber Criminals
- Insider Threats in a Cyber World
- Risk Management Techniques in Cyber Security
- Introduction to Malware
- Malware Classification
- Different Types of Trojans and Worms
- Different Classification of Exploits
- Malware and Exploit Detection
- Malware Incident Prevention
- Malware Incident Response
- Malware Static Analysis
- Malware Dynamic Analysis
- Basics of HCI Methods, Usable Security, and Design
- Basics of Computer Security
- User Studies for Usable Security
- Usable Privacy and Security
- Secure Interaction Design
- Designing Trustworthy Secure System
- Privacy Design
- Authentication and Passwords
- Secure Communications