Introduction to Cyber Security
Many people interpret and decide on what cyber security is, some see cyber security as a continuation of evolved version of it-security, others view it as a completely new branch of security and still others see it as mixture of the two. This course will give you the basics based on actual literature reviews, academic research and personal experience in global projects and work in cyber security, focusing on cyber warfare, espionage, crime and defenses as well as attacks used.
Areas covered in this course include:
Introduction into “Cyber”
Explanation of Cyber Areas such as what cyber is, what are the definitions of cyber war, espionage, crime, etc.
Basic components of Cyber Security such as OSINT, Hacking and Criminal Hackers, Hacker Profiles and Forensics, and much more.
Details into Cyber Warfare, Espionage and Crime
It is a comprehensive introduction into cyber security and the cyber areas that will help you understand more detailed aspects of the weaknesses, attacks and defenses used to attack or protect critical infrastructure.
If you need more comprehensive “practical” knowledge, we provide courses up to the Mil/DoD spec on these topics.
What are the requirements?
General security, security awareness and or an interest in technology
What am I going to get from this course?
Understand components of Cyber Security (i.e. Cyber Warfare, Espionage and Crime)
Understand how IT-Security has “morphed” into cyber security
Review latest research into attacks, defenses and reasons for various areas of cyber security
What is the target audience?
Anyone who is interested in security, securing data, information or just yourselves while online
Anyone who works or is interested in learning about cyber security and cyber research
|Section 1: Cyber Security – Definitions and The Basics|
Introduction to Cyber Security
What is “Cyber”?
How Cyber Attacks Spill over into Business
Layers of Security (The Onion)
Hacking & Criminal Hackers
The Hacker Profiling Project (HPP)
The Challenge of who is responsible
The Human Factor
|Section 2: Modern Components of Cyber|
“The Kill Chain”
|Section 3: Defending in the “Cyber World”|
IDS (Intrusion Detection System)
IPS (Intrusion Prevention System)
OSINT (Open Source Intelligence)
Actionable Data (so all those alerts help me how?)
SIEM (Security Incident and Event Monitoring)
Malware Analysis and Reverse Engineering
The Proactive Security Team
Cyber Security for Home Users
Cyber Security for Corporations / Businesses
NOC (Network Operations Center)
SOC (Security Operations Center)
|Section 4: Summary|
Cases in Cyber 1 – The Social BotNet
Cases in Cyber 2 – Backdoors in UEFI
Cases in Cyber 3 – FinFisher/Hacking Team (The Endpoint)
Cases in Cyber 4 – SCADA and Co.
|Section 5: The Final Exam|
Exam Part 1 The Cyber Basics
Exam Part 2 Modern Components of Cyber
Exam Part 3 Defending in the Cyber World
|Section 6: Proactive Security – Tools & Lost Chapters|
The Lost Chapters 1 Proactive Security Team Methodology
The Lost Chapters 2 Layers of Security and their protection
The Lost Chapters 3a PTES Penetration Testing Execution Standard
The Lost Chapters 3b PTES Penetration Testing Execution Standard
The Lost Chapters 4 Secure Network Design
The Lost Chapters 5 Wireshark and Packet Analysis
The Lost Chapters 6 Kali Linux
The Lost Chapters 7 OpenVas / Metasploit
The Lost Chapters 8 Web App Scanners
The Lost Chapters 9 Blackarch Linux
The Lost Chapters 10 Network Monitoring Primer with Security Onion VM
Michael Goedeker, Cyber Security Researcher, Speaker & Trainer, M.Sc. CISSP
Michael has worked on multiple projects globally from architecture to cyber security, working with some of the biggest fortune 50 companies and within the top 5 consulting industry. Some companies he has worked with and for include Accenture, Avanade, Dell, FSC, HP, IBM, Microsoft, Sophos and Symantec.
Michael’s company (HakDefNet) currently does research and projects focused on Global Cyber Threats, International Business and Security Leadership and are aimed at making security products, processes, solutions and defense against cyber threats as easy to understand and implement as possible. Michael is also the author of the chapter “Cyber Security: Future IT-Security Challenges for Tomorrow’s Leaders and Businesses”, and recently participated in an interview with IGI Global Promotions Coordinator Ann Lupold, elaborating on elevating issues in cyber security and cyber espionage, as well as the challenges that leaders and businesses face in confronting such issues. He also has written for various IT, Channel and Business publications and newspapers internationally.
Michael is also certified as an ISO/IEC27001:2013 Lead Auditor and is the first cyber security trainer to ever be keynote speaker at Davos.
- Lectures 0
- Quizzes 0
- Duration 50 hours
- Skill level All level
- Language English
- Students 153
- Assessments Self