Cybersecurity

This course is designed for individuals seeking a comprehensive understanding of cybersecurity, from foundational concepts to advanced threats and defensive strategies. Through a blend of interactive lectures, hands-on labs, real-world case studies, and practical projects, participants will gain the knowledge and skills necessary to secure data and systems in today’s ever-evolving digital landscape.

Beginner
16 Weeks

About This Course

Target Audience:

  1. Businesses interested in protecting their data and online safety.
  2. Aspiring cybersecurity professionals.
  3. IT professionals seeking to enhance their security skillset.

Course Format:

  1. Virtual Training: Engaging and informative presentations and in-person video lectures delivered by cybersecurity experts.
  2. Interactive Labs: Hands-on exercises to apply security concepts in simulated environments.
  3. Real-World Case Studies: Analyzing successful cyberattacks and their consequences.

What You'll Learn

Module 1: Introduction to Cybersecurity

  1.  Understanding the cybersecurity landscape: threats, vulnerabilities, and attack vectors.
  2.  The importance of cybersecurity for individuals and organizations.
  3.  Introduction to the CIA triad (Confidentiality, Integrity, Availability) in cybersecurity

Module 2: Core Security Concepts

  1.  Network security fundamentals: TCP/IP, network protocols, and network devices.
  2.  Operating system security concepts: user accounts, permissions, and access control.
  3.  Cryptography basics: encryption, decryption, and key management.

Module 3: Cybersecurity Threats and Attacks

  1.  Demystifying common cyber threats: Malware (viruses, worms, ransomware).
  2.  Exploring social engineering tactics and phishing scams.
  3.  Understanding network security vulnerabilities and attack vectors (DoS, SQL injection).

Module 4: Cybersecurity Best Practices and Controls

  1. Implementing preventative security measures: firewalls, intrusion detection systems (IDS), and anti-malware software.
  2.  Network segmentation and access control for improved security.
  3.  Importance of strong passwords, multi-factor authentication (MFA), and secure configurations.

Module 5: User Security Awareness

  1.  Identifying phishing attempts and social engineering tactics.
  2.  Safe browsing practices and secure online habits.
  3.  Securing personal devices and online accounts.

Module 6: Data Storytelling (The Power of Narrative)

  1. Explain the art of data storytelling: crafting a narrative using data to engage the audience and influence decisions.
  2. Discuss the key elements of a compelling data story (context, evidence, insights, recommendations).
  3. Cover effective communication techniques for presenting data insights clearly and concisely.

Activities:

  1. Interactive exercises on identifying the elements of a strong data story.
  2. Group projects on developing data stories from provided datasets.
  3. Peer-review sessions on refining data storytelling techniques.

Module 7: Network Security

  1.  Firewalls: configurations, types (stateful, packet filtering), and advanced features.
  2.  Intrusion Detection/Prevention Systems (IDS/IPS): functionalities and deployment strategies.
  3.  Wireless network security: securing Wi-Fi networks and access points (WPA2, WPA3).

Module 8: System and Application Security

  1.  Operating system hardening: securing user accounts, permissions, and system configurations.
  2.  Application security best practices: secure coding principles and vulnerabilities.
  3.  Secure coding fundamentals (optional): common vulnerabilities and coding practices for mitigation

Module 9: Incident Response and Recovery

  1.  Developing a cybersecurity incident response plan: detection, containment, eradication, and recovery procedures.
  2.  Digital forensics basics: preserving evidence and conducting investigations after a cyberattack.
  3.  Importance of reporting cyberattacks to appropriate authorities.

Module 10: Cloud Security

  1. Security considerations for cloud computing platforms (AWS, Azure, GCP).
  2. Cloud security models: shared responsibility model, and securing cloud resources.
  3. Cloud security best practices: data encryption, access control, and incident response in the cloud.

Module 11: Web Application Security

  1.  Common web application vulnerabilities (OWASP Top 10).
  2.  Web application security testing (WAST) tools and methodologies.
  3.  Secure coding practices for web developers.

Module 12: Security Operations Center (SOC)

  1.  Understanding the role of SOC in cybersecurity operations.
  2.  Security information and event management (SIEM) systems.
  3.  Incident response procedures and threat hunting techniques

Module 13: Cryptography and Data Security

  1. Advanced encryption algorithms (AES, RSA) and key management techniques.
  2.  Data security best practices: data encryption at rest and in transit.
  3.  Understanding
£800.00

Course Features

  • 16 Weeks
  • Beginner
  • Certificate of Completion
Chat
Infinix Tech Joke of the Day
Loading joke...