The main propose is to teach the fundamental investigative techniques needed to respond to threat actors and intrusion scenarios. The latest in forensics and intrusion techniques.

Students will learn how to conduct rapid triage on a system to determine if it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms, develop indicators of compromise to further scope an incident, and much more.


Developers, managers, IT /Network administrators

Basic computers networks and information security knowledge


40 Hours

Cyber Security


Certificate: No

Price: contact us for more details

Запишитесь на курс

Оставьте свои контактные данные и мы свяжемся с Вами

Course Outline


Upon successful completion of this course, students will learn the basic knowledge about:

  • The basic concepts of the information security and cyber world
  • Major players and threats in the cyber world
  • Common defense/attack methodologies
  • Concepts in the it infrastructure communication world
  • How to handle a cyber-event
  • The range of tools, technics and procedures that can help mitigate cyber risks Social engineering Future aspects of cyber


Getting familiar with the world of cyber security

  • Definition of information security
  • Information security Vs. Cyber
  • The virtual organization
  • Attacker types and categories in the cyber landscape
  • Social engineering – Manipulating the human factor


Cyber security concepts

Introducing basic concepts and framework of cyber security:

  • Cyber risk management framework
  • Cyber threats types and vectors
  • Cyber security policies
  • Principals in cyber security process controls
  • Basic principals in cyber defense

Cyber architecture principals

Learning about cyber security architecture fundamentals

  • Cyber perimeter concepts
  • The OSI Module
  • TCP/IP Communication protocol
  • DID – Defense In Depth
  • Firewalls
  • Segmentation principals
  • Encryption

Network/System/Application/Data Security

Cyber security concepts and practices while defending networks, systems, applications and data

  • Basic monitoring
  • Network management
  • Securing systems
  • Securing applications
  • OWASP top 10 security risks
  • Data classification


Incident response

What is an event? What is an incident? And what are the ways to mitigate them

  • Event/Incident definition
  • Categories & types
  • Security event management


Various cyber issues

Consider and analyze various aspects regarding the cyber world

  • Cyber insurance
  • Darknet
  • Notable cyber attacks


The future landscape of cyber

Reviewing security implications and evolving technologies

  • Secure by design principal
  • IOT
  • Cloud
  • BYOD
  • Machine learning & BOTs
  • Mobile