Threats & defenses essentials

5 days training event


Course Outlines - Download PDF

What will you learn?

  • Start a career in cyber security. Become a cyber security specialist.

  • Understand the basic concepts and terminologies used in the information and cyber security fields.

  • An advanced practical skill set in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness.

  • The very latest up-to-date information and methods.

  • Explore the threat landscape - Darknets, dark markets, zero-day vulnerabilities, exploit kits, malware, phishing and much more.

  • Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation.

  • You will master encryption in an easy-to-follow crash course

  • You will learn about nation-state secret tracking and hacking infrastructure.


  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install the software. A willingness to learn.

Course Outlines - 5 Days


  • Welcome and introduction to the instructor

  • Goals and Learning Objectives

  • Difference between Information Security and Cyber Security

  • Basic Terminologies

  • Computer Protocols

  • TCP/IP

Hackers and Crackers

  • The Top 3 Things To Stay Safe Online

  • Security Bugs and Vulnerabilities - The Vulnerability Landscape

  • What is NOT Hacking

  • Types of Hackers

  • The Hacking Methodology

  • The WhoIS Query

  • Social Engineering


  • Brute Force Attacks

  • Phishing, Vishing, and SMShing

  • Spamming & Doxing

  • Bots and Botnets

  • DoS and DDoS

  • Pings

  • Man in the Middle Attacks

  • SQL Injections


  • Viruses & Worms

  • Trojans

  • Adware and Spyware

  • Ransomeware

  • Browser Hijacking

  • Other Types of Malware

Encryption Crash Course

  • Symmetric Encryption

  • Asymmetric Encryption

  • Hash Functions

  • Digital Signatures

  • Secure Sockets Layer SSL and Transport Layer Security TLS

  • SSL Stripping

  • HTTPS (HTTP Secure)

  • Digital Certificates

  • Certificate Authorities and HTTPS

  • End-to-End Encryption (E2EE)

  • Steganography

  • How Security and Encryption is Really Attacked


  • Firewalls

  • Encryption

  • Biometrics

  • Anti Virus

  • Factor Authentication Methods

  • Honey Pots and DMZs

  • Security for Wireless Networks

  • Password Management

Cyber Security at the Work Place

  • Cyber Security Policies

  • BYOD Management

  • A Sample BYOD Policy

  • The Security vs Ease of Access Paradox

Social Engineering and Social Media Offence and Defence

  • What is Social Engineering?

  • Reconnaissance Methods

  • The Way Back Machine

  • Information Disclosure and Identity Strategies for Social Media

  • Identify Verification and Registration

Security Domains

  • What is Social Engineering?

  • Reconnaissance Methods

Security Through Isolation and Compartmentalization

  • Introduction to Isolation and Compartmentalization

  • Physical and Hardware Isolation - How to change the Mac Address

  • Physical and Hardware Isolation - Hardware Serials

  • Virtual Isolation

  • Dual Boot

  • Built-in Sandboxes and Application Isolation

  • Windows - Sandboxes and Application Isolation

  • Windows - Sandboxes and Application Isolation - Sandboxie

  • Linux - Sandboxes and Application Isolation

  • Mac - Sandboxes and Application Isolation

  • Virtual Machines

  • Virtual Machine Weaknesses

  • Virtual Machine Hardening

  • Whonix OS - Anonymous Operating system

  • Whonix OS - Weaknesses

  • Qubes OS

  • Security Domains, Isolation and Compartmentalization


أماكن ومقرات التدريب حول العالم



Kuala Lumpur

Kuala Lumpur






Sunny resort beach with palm tree at the coast shore of Red Sea in Sharm el Sheikh, Sinai, Egypt, Asia in summer hot. Bright sunny light

Sharm El Sheikh