MMSCYBER003: Basics of Cyber Security (3 Days)
Course Description
This course is designed for users who understand the general concepts of information technology and are looking to expand their knowledge in cyber security. With a rising threat of cyber-attacks, this course will heavily emphasize on strengthening your cyber-environment and securing sensitive information. Principles will be discussed and integrated with interactive labs to give a foundation of understanding how to stay protected, mitigate risks, use networking tools and protocols, and more.
This course highlights the basic concepts and students will gain knowledge on aspects of Cyber Security: CIA Triad, Principle of Least Privilege, the importance of password strength, Wireless Security, various types of viruses, Compliance and Documentation. This will provide information on principles and practices commonly used throughout the industry.
After completing this course, students will be able to:
- Recognize basic network security devices
- Use multiple network traffic tools
- Understand Wireless Security
- Enforce Web and Browser Security
- Recognize secure communication via encryption/cryptography
- Identify common viruses
- Manage Operating System (OS) Security
- Utilize password strengthening and management tools
- Follow security compliance and complete documentations
Course Outline
Module One: Course Introduction
- Risk
- Cyber Attacks
- Confidentiality, Integrity, Availability (CIA Triad)
- Principle of Least Privilege
- Course overview
- Learning Objectives
Module Two: Introduction to Networks
- Network Basics
- Open Systems Interconnection Model (OSI Model)
- Different topologies
- MPLS
- Types of Networks
- Network Protocols
- Advantages of Networks
Module Three: Network Security Devices
- Firewalls
- Role of firewalls in Network Security
- Types of Firewalls
- Planning to use security devices
- How to configure network devices such as routers and firewalls
- Protecting Networks
- Types of Security
- Flavors and brands Available
- How to protect against Attacks
Module Four: Network Traffic and Analysis
- How to identify hostile entities
Module Five: Internet / Web Security
- Browser Choice
- Protecting web servers
Module Six: Secure Communication
- Cryptography/Encryption
- Classic Cryptography
- Exercise: Encryption/Cryptography
- Symmetric Cryptography
- Public Key Cryptography
- Cryptanalysis
- PKI
- Steganography
Module Seven: Viruses
Module Eight: Operating System (OS) Security
- OS Security Basics
- Active Directory
- Demonstration: Active Directory
- BitLocker
- AppLocker
- UAC (User Account Control)
- Demonstration: User Account Control (UAC)
- Improving Security of Linux/Unix Systems
Module Nine: Password Management and Strength
- Password Recovery /Cracking Tools (Windows and Unix)
- Password management and strength
Module Ten: Wireless Security
Module Eleven: Compliance and documentation
- Policy basics
- Six Steps of incident handling
Module Twelve: Course Close out
- Today’s IA threats
- How to Mitigate 95% of security risks
- Recommended Reading
- Questions and Answers