Partner

CSB
Introduction to Cyber Security

التقييم:
4.8
الإنجليزي
متقدم
Video preview
لا توجد جلسات متاحة في هذه اللحظة.
تواصل مع مستشار التدريب لدينا لمعرفة المزيد عن الجلسات المتاحة التالية.
Downloadلتحميل الكتيب

نبذة عن الدورة التدريبية

Whenever you are developing an application or just writing code, you have to do extensive testing, not only for the straight forward test cases, but also for the cases that may lead to vulnerabilities in your system. If there is one way to make the application work, you have to think of the infinity - 1 ways that will make the application stop. In this course, we will have a deep overview about the hacking theories and practical techniques in order to be able to accomplish several hacking attempts. Since this course will be delivered online, we will be using online hacking tools that work on any desktop regardless of the setup and regardless of the operating system.

المخرجات الرئيسية

1
At the end of this course, participants will be able to: Learn what is ethical hacking, its fields and the different types of hackers
2
Install hacking lab & needed software (works on Windows, OS X and Linux)
3
Hack & secure both WiFi & wired networks
4
Discover vulnerabilities & exploit them hack into servers
5
Hack secure systems using client-side and social engineering attacks

IBM
Brand Logo
Online courses from IBM. IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world. For more information about IBM visit: www.ibm.com. Digital Skill Badges are now available in ALL IBM courses on edX. In addition to receiving an edX verified certificate, learners who successfully complete any IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in the course. Enroll in any IBM course today to learn more, complete the course and claim your badge.

محتوى الدورة التدريبية

Part 1
Module 1: History of Cybersecurity
This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.
Module 2: A brief overview of types of actors and their motives
This module will provide you with a brief overview of the types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.
Introduction to Ethical Hacking and Cyber Security | Theory
What are the various types of hackers | Theory
Introduction to Kali Linux | Lab
Why Kali Linux is considered the best operating system for hacking | Theory
What are the best built-in tools in Kali Linux for hacking | Lab
Part 2
Module 3: An overview of key security concepts
This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.
Module 4: An overview of key security tools.
In this module, you will be introduced to key security tools including firewalls, anti-virus, and cryptography.
What is SQL Injection | Theory
Dangers of SQL Injection Vulnerabilities | Theory
Bypassing Logins Using SQL injection Vulnerability | Lab
What is SQLMap and how is it used? | Lab
Reading Database Information | Lab
Finding Database Tables | Lab
Extracting Sensitive Data Such As Passwords | Lab
Part 3
What is Phishing? | Theory<br/>Why is it used? | Theory<br/>Can you differentiate between these 2 websites? (One is normal, and one is phishing) | Lab<br/>What do we need to create a phishing page? | Lab<br/>What is Social Engineering? What is SE Toolkit and how is it used? | Lab<br/>We will use this tool to learn how to spot a phishing website: https://phishingquiz.withgoogle.com/ We will use the real code of the login page of Google accounts (Gmail) and we will host it on a free server which is 000webhost.com. We will modify the code to convert the initial login page of Gmail to a phishing page
Part 4
What is Network Sniffing? | Theory<br/>What is Password Sniffing? | Theory<br/>What are the tools used to steal passwords by sniffing packets? | Lab<br/>Can we steal passwords on HTTPS websites or only HTTP? | Lab<br/>We will ask the participants to download WireShark on their computers to sniff packets on the network.<br/>After that, we will use an Online website called Caisis.org/demo. This is a non secure website. We will login on this website, and we will go to WireShark and filter the packets and we will see the username and password that we entered
Part 5
Understanding the concept of Password Cracking | Theory<br/>Why and how are passwords cracked? | Lab<br/>What is Encryption and Decryption? | Lab<br/>First, we will use a website called PasswordMeter.com to check the strength of our password<br/>Then, we will use an official website from Kaspersky called Password.Kaspersky.com to check how much time it needs for our password to by cracked<br/>Then, we will use the best online tool for Encryption and Decryption called cryptii.com<br/>At the end, we will ask the participants to install Cain and Abel, and then we will create a new user on our computer and see how we can crack its password
Part 6
What is the concept behind Viruses? | Theory<br/>How are they made? What are the various purposes of Viruses? | Theory<br/>How are they transmitted? | Lab<br/>What’s the difference among a Virus, Trojan and Worm | Lab<br/>How to send fake emails from trusted addresses like [email protected] | Lab<br/>We will create our own Virus with a purpose to harm the computer of the victim by disabling all antiviruses first then deleting all his files. Then, we will learn how to hide the virus by appending it to an image, and sending it to the victim using a Fake Email
Part 7
What is cross site scripting? | Theory<br/>How does it become harmful and how to take advantage of it? | Lab<br/>What are the various vulnerabilities that can be exploited using Cross Site Scripting? | Lab<br/>First, we will use an online website called https://www.hacksplaining.com/exercises/xss-stored to simulate the concept of XSS hacking<br/>After that, we will use an online hacking game developed by Google called https://xss-game.appspot.com/ to teach us how to exploit Cross Site Scripting vulnerabilities<br/>What is DDOS? How does it work? | Theory<br/>Why do hackers use DDOS? | Lab<br/>Understanding IP addresses and SubNet Masks to prevent specific IP attacks | Lab
Part 8
We will use a website called https://www.hacksplaining.com/exercises/denial-of-service-attacks to simulate the DDOS attack on a server and learn how to use IP calculations and Subnet masks to block a range of IPS<br/>Understanding Security Operations Center | Theory<br/>What are the components of a Security Operations Center | Lab<br/>Why do we need it and how it can help us | Lab<br/>Understanding Incident Management | Theory<br/>What are the steps that we need to follow for an excellent Incident Response | Theory<br/>What is Digital forensics and how to investigate Forensic cases | Lab<br/>We will use the Hacksplaining.com website to simulate real-life hacking attempts of Password Mismanagement, Clickjacking, and Email spoofing. After that, we will learn how to behave when we receive similar requests
Final Project
At the end of the course, the trainer summarizes all the material explained during the previous days and focuses on the most important points which are applicable in our daily life. Later, the trainer splits the class into several groups (teams) and distributes the final project which is a simulation of real-life tasks and challenges. Every team starts applying what is requested in the final project. Meanwhile, the trainer passes through team members and tries to help them in case of any difficulty faced. At the end of the day, every team should present his final work in front of the class and an open discussion is held to assess the work.

على من يجب الحضور؟

This highly practical and interactive course has been specifically designed for
This course is relevant for senior managers and executives who are involved in crafting cybersecurity strategies and leading digital transformation program for their companies.
It is equally useful for anyone who wants to learn about cybersecurity and how can technology create value in their profession today.

الدورات ذات الصلة

التعليمات

AR What language will the course be taught in and what level of English do I need to take part in an LEORON training program?
AR Most of our public courses are delivered in English language. You need to be proficient in English to be able to fully participate in the workshop and network with other delegates. For in-house courses we have the capability to train in Arabic, Dutch, German and Portuguese.
AR Are LEORON Public courses certified by an official body/organization?
AR LEORON Institute partners with 20+ international bodies and associations.We also award continuing professional development credits (CPE/PDUs) for:1. NASBA (National Association of State Boards of Accountancy) 2. Project Management Institute PDUs 3. CISI credits 4. GARP credits 5. HRCI recertification credits 6. SHRM recertification credits
AR What is the deadline for registering to a public course?
AR The deadline to register for a public course is 14 days before the course starts. Kindly note that occasionally we do accept late registrations as well, but this needs to be confirmed with the project manager of the training program or with our registration desk that can be reached at +91 4 95 5711 or [email protected].
AR What does the course fee cover?
AR The course fee covers a premium training experience in a 5-star hotel, learning materials, lunches & refreshments, and for some courses, the certification fee and membership with the accrediting bodies.
AR Does LEORON give discounts?
AR Yes, we can provide discounts for group bookings. If you would like to discuss a discount on a corporate level, we will be happy to talk to you.

التعليقات