Threats & defenses essentials
5 days training event
What will you learn?
Start a career in cyber security. Become a cyber security specialist.
Understand the basic concepts and terminologies used in the information and cyber security fields.
An advanced practical skill set in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness.
The very latest up-to-date information and methods.
Explore the threat landscape - Darknets, dark markets, zero-day vulnerabilities, exploit kits, malware, phishing and much more.
Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation.
You will master encryption in an easy-to-follow crash course
You will learn about nation-state secret tracking and hacking infrastructure.
A basic understanding of using operating systems, networks, and the Internet. Be able to download and install the software. A willingness to learn.
Course Outlines - 5 Days
Welcome and introduction to the instructor
Goals and Learning Objectives
Difference between Information Security and Cyber Security
Hackers and Crackers
The Top 3 Things To Stay Safe Online
Security Bugs and Vulnerabilities - The Vulnerability Landscape
What is NOT Hacking
Types of Hackers
The Hacking Methodology
The WhoIS Query
Brute Force Attacks
Phishing, Vishing, and SMShing
Spamming & Doxing
Bots and Botnets
DoS and DDoS
Man in the Middle Attacks
Viruses & Worms
Adware and Spyware
Other Types of Malware
Encryption Crash Course
Secure Sockets Layer SSL and Transport Layer Security TLS
HTTPS (HTTP Secure)
Certificate Authorities and HTTPS
End-to-End Encryption (E2EE)
How Security and Encryption is Really Attacked
Factor Authentication Methods
Honey Pots and DMZs
Security for Wireless Networks
Cyber Security at the Work Place
Cyber Security Policies
A Sample BYOD Policy
The Security vs Ease of Access Paradox
Social Engineering and Social Media Offence and Defence
What is Social Engineering?
The Way Back Machine
Information Disclosure and Identity Strategies for Social Media
Identify Verification and Registration
What is Social Engineering?
Security Through Isolation and Compartmentalization
Introduction to Isolation and Compartmentalization
Physical and Hardware Isolation - How to change the Mac Address
Physical and Hardware Isolation - Hardware Serials
Built-in Sandboxes and Application Isolation
Windows - Sandboxes and Application Isolation
Windows - Sandboxes and Application Isolation - Sandboxie
Linux - Sandboxes and Application Isolation
Mac - Sandboxes and Application Isolation
Virtual Machine Weaknesses
Virtual Machine Hardening
Whonix OS - Anonymous Operating system
Whonix OS - Weaknesses
Security Domains, Isolation and Compartmentalization
أماكن ومقرات التدريب حول العالم
Sharm El Sheikh