Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase.
Cyber Criminals are also increasing in capabilities and taking advantage of the lack of pace in the release of security software patches and updates due to the continuous adoption of new technologies like the Internet of Things (IOT).
This training outcomes are as follows: –
Cyber Security Essentials (CSE) is aimed to provide participants with the fundamental knowledge of Cyber Security and Network Security. Through real-time demonstration on scenario based hands-on exercises, participants will be able to experience first-hand different types of attacks.
Essential concepts on networking and security will also be covered allowing participants to gain in-depth knowledge on Cyber Security.
Unit 1: Fact about Living in Real World
- Introduction of Security
- Facts about Hacking in Real World
Unit 2: Introduction to Ethical Hacking
- All About Ethical Hacking
- How We Secure Things by Ethical hacking
Unit 3: Hacking Phases
- Gaining Access
- Maintain Access
- Clearing Tracks
Unit 4: How to Build a Lab to Hack Safely
- Precautions to Before to Start Hacking
- Configure Lab for Hack Safely
Unit 5: Installing and Configuring Your Windows Server VMs
- Installing Windows Server (Windows Server 2008 / 2012)
- Installing Linux Server
Unit 6: Installing and Configuring Your Desktop VMs
- Installing Windows Client OS (Windows 7 / Windows 10)
- Installing Kali Linux
- Installing Ubuntu
Unit 7: Information Security Overview
- Hacking vs Ethical Hacking
- Fundamentals of Information Security
Unit 8: Security Threats and Attack Vectors
- Threats Hosts
- Threats Applications
- Threats Human
- Threats Networks
- Attack Vectors
Unit 9: Hacking Concepts
- Hacking Overview
- History of Hacking – From Beginning to Future
- Types of Hackers
- Why Hacker Hacks?
- Impacts of Hacking on Individuals, Society and Businesses
Unit 10: Attack Types
- Misconfiguration Attacks
- Shrink-wrap Code Attacks
- OS Attacks
- Entry Points for an Attack 5. Application Attacks
Unit 11: What is Security Controls
- Necessity of Ethical Hacking
- What Skills You Must Have
- Incident Management
- Security Policies
- Penetration Testing
Who Will Benefit From This Course
Cyber Security Essentials (CSE) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.
Class is limited to 20 participants as hands-on sessions and real-time demonstration is expected.
There are no prerequisites needed for this program. Anyone who is interested in learning more about Cyber Security can join this program.
Participants are required to pass an examination. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered in the course.
Participants will be awarded a Certificate of Competency in Cyber Security Essentials (CSE) upon meeting the requirements and passing the examination.
If you need further info on this program, all you need to do is to fill up the form in this page and/or call/email us. We will brief you on the details of this program and guide you all the way!
You can also download the Program Brochure for more detailed explanation on the program.
For more information, please contact:
- Customer Hotline – 03 77 83 3333
- Email Enquiry – email@example.com
- Web Enquiry – www.axsel.com.my/cse
Are you an individual looking to join the program yourself?
Write to us in the form below, we will contact you to discuss how best to fit your schedule.
Are you a company looking for an In-House program?
Write to us in the form below, we would be happy to talk to you about our in-house rates.