We live in a new age, the cybernetic age. Every day organizations and households are forced to deal with cyber-attacks that are becoming more and more sophisticated. The words cyber-attacks have become daily visitors in the news headlines, the have become an integral part of our lives. This trend integrates with the fact that more and more aspects of our lives are becoming digital: Governmental, medical, financial services, the media we consume, our workplace and the list keeps on and on. In this current situation, the cyber world meets us everywhere since the meaning of the phrase digital is that all the above aspects are relying on various computer systems and connectivity to the internet. Cyber attackers are using this fact to hack into these systems in order to interrupt these services, to shut down the systems themselves, to leak private and confidential information or in order to alter it etc. But let’s take a step back, start in the beginning and try to answer the basic questions: what is Cyber? What’s the difference between cyber and information security? What types of cyber-attacks exist? What is social engineering? And how do we counter react to these threats? These are just a few of the questions we’ll answer during these course

The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information.

Prerequisites

  • Basic+ English
  • Computer knowledge (User level)
  • Objectives

    Upon successful completion of this course, students will learn the basic knowledge about:

    • The basic concepts of the information security and cyber world
    • Major players and threats in the cyber world
    • Common defense/attack methodologies
    • Concepts in the it infrastructure communication world
    • How to handle a cyber-event
    • The range of tools, technics and procedures that can help mitigate cyber risks Social engineering Future aspects of cyber
}

24 Hours

Cyber Security

h

Certificate: No

Price: contact us for more details

Запишитесь на курс

Оставьте свои контактные данные и мы свяжемся с Вами

Course Outline

 

Introduction

Getting familiar with the world of cyber security

  • Definition of information security
  • Information security Vs. Cyber
  • The virtual organization
  • Attacker types and categories in the cyber landscape
  • Social engineering – Manipulating the human factor

Cyber security concepts

Introducing basic concepts and framework of cyber security:

  • Cyber risk management framework
  • Cyber threats types and vectors
  • Cyber security policies
  • Principals in cyber security process controls
  • Basic principals in cyber defense

Cyber architecture principals

Learning about cyber security architecture fundamentals

  • Cyber perimeter concepts
  • The OSI Module
  • TCP/IP Communication protocol
  • DID – Defense In Depth
  • Firewalls
  • Segmentation principals
  • IPS/IDS
  • Encryption

Network/System/Application/Data Security

Cyber security concepts and practices while defending networks, systems, applications and data

  • Basic monitoring
  • Network management
  • Securing systems
  • Securing applications
  • SSDLC
  • OWASP top 10 security risks
  • Data classification

Incident response

What is an event? What is an incident? And what are the ways to mitigate them

  • Event/Incident definition
  • Categories & types
  • Security event management
  • BCP/DRP

 

Various cyber issues

Consider and analyze various aspects regarding the cyber world

  • Cyber insurance
  • Darknet
  • Notable cyber attacks

 

The future landscape of cyber

Reviewing security implications and evolving technologies

  • Secure by design principal
  • IOT
  • Cloud
  • BYOD
  • Machine learning & BOTs
  • Mobile