Cyber Security Essentials (CSE)

by Axsel Management International Sdn Bhd Claim Listing

Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Axsel Management International Sdn Bhd Logo

img Duration

3 Days

Course Details

Cyber threats are growing in complexity and the impact scale of cyber-crimes is increasing dramatically. With the advancement in internet technologies and inter-connectivity between devices and sensors, it is inevitable that the volume of personal and corporate data continues to increase.

Cyber Criminals are also increasing in capabilities and taking advantage of the lack of pace in the release of security software patches and updates due to the continuous adoption of new technologies like the Internet of Things (IOT).

 

Course Objectives:

  • Cyber Security Essentials (CSE) is aimed to provide participants with the fundamental knowledge of Cyber Security and Network Security. Through real-time demonstration on scenario based hands-on exercises, participants will be able to experience first-hand different types of attacks.
  • Essential concepts on networking and security will also be covered allowing participants to gain in-depth knowledge on Cyber Security.

 

Course Outline:

  • Unit 1: Fact about Living in Real World
  • Introduction of Security
  • Facts about Hacking in Real World
  • Unit 2: Introduction to Ethical Hacking
  • All About Ethical Hacking
  • How We Secure Things by Ethical hacking
  • Unit 3: Hacking Phases
  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintain Access
  • Clearing Tracks
  • Unit 4: How to Build a Lab to Hack Safely
  • Precautions to Before to Start Hacking
  • Configure Lab for Hack Safely
  • Unit 5: Installing and Configuring Your Windows Server VMs
  • Installing Windows Server (Windows Server 2008 / 2012)
  • Installing Linux Server
  • Unit 6: Installing and Configuring Your Desktop VMs
  • Installing Windows Client OS (Windows 7 / Windows 10)
  • Installing Kali Linux
  • Installing Ubuntu
  • Unit 7: Information Security Overview
  • Hacking vs Ethical Hacking
  • Fundamentals of Information Security
  • Unit 8: Security Threats and Attack Vectors
  • Threats Hosts
  • Threats Applications
  • Threats Human
  • Threats Networks
  • Attack Vectors
  • Unit 9: Hacking Concepts
  • Hacking Overview
  • History of Hacking – From Beginning to Future
  • Types of Hackers
  • Why Hacker Hacks?
  • Impacts of Hacking on Individuals, Society and Businesses
  • Unit 10: Attack Types
  • Misconfiguration Attacks
  • Shrink-wrap Code Attacks
  • OS Attacks
  • Entry Points for an Attack 5. Application Attacks
  • Unit 11: What is Security Controls
  • Necessity of Ethical Hacking
  • What Skills You Must Have
  • Incident Management
  • Security Policies
  • Penetration Testing

 

Who Will Benefit From This Course:

  • Cyber Security Essentials (CSE) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.
  • Class is limited to 20 participants as hands-on sessions and real-time demonstration is expected.

 

Examination:

  • Participants are required to pass an examination. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered in the course.

 

Certification:

  • Participants will be awarded a Certificate of Competency in Cyber Security Essentials (CSE) upon meeting the requirements and passing the examination.
  • Petaling Jaya Branch

    No.19, 1st Floor, Jalan 1/21, Petaling Jaya

Check out more Cybersecurity courses in Malaysia

Mideast Malaysia Business and Training Logo

Managing Cybersecurity & Security Awareness

The training designed to supplement the managing of Cybersecurity and Information Security Awareness. It provides a more in-depth review of specific cybersecurity topics.

by Mideast Malaysia Business and Training [Claim Listing ]
Bridgit Sdn Bhd Logo

Certified Cyber Security Professional

In the current environment, Digitalization, IR 4.0 and IOT create special challenges with regards to cybersecurity. With many people still working online and at home, data protection and excellent IT security is an absolute must.

by Bridgit Sdn Bhd [Claim Listing ]
TSY Consultancy International Logo

Cyber Terrorism (Identify, Nullify And Counter)

Cyber Terrorism (Identify, Nullify And Counter) course is offered by TSY Consultancy International. TSY Consultancy International is an international personal and professional growth, training and development company.

by TSY Consultancy International [Claim Listing ]
AA Knowledge Malaysia Sdn Bhd Logo

Certificate In Cyber Security

Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.

by AA Knowledge Malaysia Sdn Bhd [Claim Listing ]
Iconic Training Solutions Logo

Fundamental Of Cyber Security

In a 2 day program, business owners, managers and professionals can come to understand the trends and threats related to cyber security. Beyond understanding, learners relate to good practices and apply to self and their organization.

by Iconic Training Solutions [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy