Cybersecurity Expert

Course Summary

As an IT Technician and Support Technician, you are on the front line of protecting your organization’s systems and providing support to users.
To strengthen your skills and become an outstanding Cybersecurity expert, sign up for our customized Cybersecurity training for IT Technicians and Support Technicians!

  • Basic Cyber Threats and Vulnerabilities:
    You will get an overview of the most common cyber threats and vulnerabilities faced by IT environments and users. We will focus on phishing, malware, social engineering fraud and other threats that can affect an organization’s systems.

  • Network Infrastructure Security:
    You will learn how to securely configure and protect network devices, including firewalls, switches and wireless access points. We will also discuss network security measures and protocols.

  • Security in Operating Systems and Applications:
    We will cover security aspects of operating systems and applications used in IT environments. You will learn how to configure and manage systems and applications in a secure way to minimize vulnerabilities.

  • Incident Management and Response:
    You will develop the ability to manage security incidents and implement recovery actions. We will go through the incident management lifecycle, from detection and reporting to assessment and recovery.

  • User Support Security:
    You will gain insights into safe practices for providing support to users and managing their security-related issues. We will discuss user training and preventive measures to reduce the risks of user-related incidents.

  • Security Awareness Campaigns and Training:
    You will learn how to design and implement effective security awareness campaigns to promote a strong security culture within the organization. We will discuss training and educational materials to raise cybersecurity awareness among users.

Specifically tailored for IT Technicians and Support Technicians to address their unique challenges and requirements.

  • Practically oriented with real-life scenarios and labs to improve your ability to deal with cyber threats.
  • Experienced instructors who are experts in cybersecurity and have extensive industry experience.
  • Opportunity to network with other IT Technicians and Support Technicians and exchange experiences and best practices.
  • Basic IT skills:
    Participants should have a basic understanding of IT environments, operating systems, networks and applications. They should be familiar with basic network protocols and common operating systems such as Windows.
  • Network security: Knowledge of basic network security principles and concepts is essential. Participants should have an understanding of firewalls, switches, wireless networks and other network devices, knowledge equivalent to the Network Engineering and Data Communications course

This course has no certification

  • Introduction to cybersecurity and security culture
  • The role of IT Technician and Cybersecurity Support Technician
  • Group work
  • Overview of basic cyber threats and vulnerabilities
  • Identification and management of different attacks
  • Fighting malware and viruses
  • Social engineering fraud and methods to prevent it
  • Security in user support and handling security-related issues
  • User training and best practices to raise cybersecurity awareness
  • Security awareness campaigns and designing effective campaigns
  • Implementation of security measures in remote support and mobility
  • Security procedures and best practices to protect sensitive information
  • Future trends in cybersecurity and continued learning
  • Use different tools to identify vulnerabilities in an environment.
  • Methods for risk assessment and vulnerability analysis in IT environments
  • Management of security policies and compliance with rules and regulations
  • The importance of implementing security measures such as firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and VPN.
  • Backing up and restoring data
  • Management of authentication and access control
  • Collaborate with internal and external stakeholders in incident response
  • IoT security and managing security risks in a connected environment
  • Mobile device security and BYOD (Bring Your Own Device)
  • Data privacy and handling of personal data
  • Digital forensics and evidence preservation

Course Overview

25 900 kr

3 days

Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.

Customized Courses

The course can be adapted from several perspectives:

  • Content and focus area
  • Extent and scope
  • Delivery approach

In interaction with the course leader, we ensure that the course meets your needs.

Skicka intresseanmälan för utbildningen

Send an expression of interest for the training