Introduction To Cybersecurity
Introduction To Cybersecurity
Introduction To Cybersecurity
1.
This module will provide a comprehensive view of the cybersecurity landscape,
emphasizing its critical role in safeguarding digital assets. You will explore the
various domains within cybersecurity and how they interrelate to form a cohesive
defense strategy.
Mode of Training:
1 Hour of Live Instructor-Led Session
Learning Objectives:
Cybersecurity Fundamentals
2.
In this module you will gain an in-depth understanding of threats, vulnerabilities,
and risks, learning to discern their subtleties. You will get into the fundamental
principles of confidentiality, integrity, and availability (CIA) and how they're
applied in real-world scenarios. Additionally, we'll analyze and categorize diverse
cyber threats, unraveling their origins, methodologies, and potential impacts.
Mode of Training:
10 Hours of On-Demand Learning
Learning Objectives:
Linux Fundamentals
3.
Dive into the Linux environment, grasping its architecture and core components.
You'll become a master of essential Linux commands, learning their syntax, options,
and practical use cases. Moreover, we'll explore advanced file and directory
management, ensuring efficient data organization and security.
Mode of Training:
4 Hours of Live Instructor-Led Sessions and 6 Hours of On-Demand Learning
Learning Objectives:
.
Learn the intricacies of networking, mastering IP addressing, subnets, routing, and
the OSI model layers. You will also delve into the art of analyzing network
traffic, pinpointing vulnerabilities, and implementing effective countermeasures to
mitigate potential threats.
Mode of Training:
2 Hours of Live Instructor-Led Sessions and 6 Hours of On-Demand Learning
Learning Objectives:
Bash Scripting
5.
Acquire new skills at writing and using Bash scripts, which are like sets of
instructions for your computer. You'll learn the basics like how to use variables
and functions, and we'll dive into more advanced stuff like loops, if-then
statements, and working with data.
Mode of Training:
4 Hours of Live Instructor-Led Sessions and 3 Hours of On-Demand Learning
Learning Objectives:
Penetration Testing
11.
This module will equip you with the skills and knowledge to master the art of
penetration testing. From planning and reconnaissance to exploitation and
reporting, you'll learn the entire process. Using a variety of tools and
techniques, you'll identify and exploit vulnerabilities in systems and networks.
Additionally, you'll develop strategies to remediate these vulnerabilities,
enhancing the security of the target environment.
Mode of Training:
10 Hours of On-Demand Learning
Learning Objectives:
With a Master's in Cybersecurity, you can pursue a range of high-demand and well-
compensated job opportunities:
Numerous top companies across various industries are actively hiring professionals
with a Master's in Cybersecurity. Here are 15 prominent organizations:
Certified Ethical Hacking (CEH v12): Training for the CEH v12 certification in
ethical hacking and penetration testing.
Prerequisites
Familiarity with basic computer operations, file management, and internet usage
Knowledge of fundamental IT concepts such as operating systems, software
applications, hardware components
Understanding of basic networking concepts like IP addresses, protocols, and
network topologies
Ability to think critically and logically to analyze problems and situations
A genuine interest in the field of cybersecurity and a desire to learn about
protecting digital assets.
As with physical security, the motivations for breaches of computer security vary
between attackers. Some are thrill-seekers or vandals, some are activists, others
are criminals looking for financial gain. State-sponsored attackers are now common
and well resourced but started with amateurs such as Markus Hess who hacked for the
KGB, as recounted by Clifford Stoll in The Cuckoo's Egg.
Attackers motivations can vary for all types of attacks from pleasure to for
political goals.[15] For example, "hacktivists" may target a company a company or
organisation that carries out activities they do not agree with. This would be to
create bad publicity for the company by having its website crash.
High capability hackers, often with larger backing or state sponsorship, may attack
based on the demands of their financial backers. These attacks are more likely to
attempt more serious attack. An example of a more serious attack was the 2015
Ukraine power grid hack, which reportedly utilised the spear-phising, destruction
of files, and denial-of-service attacks to carry out the full attack.[184][185]
A standard part of threat modeling for any particular system is to identify what
might motivate an attack on that system, and who might be motivated to breach it.
The level and detail of precautions will vary depending on the system to be
secured. A home personal computer, bank, and classified military network face very
different threats, even when the underlying technologies in use are similar.[188]