CYBINT CYBER SECURITY SPECIALIST
Cyber Security is the fastest growing technology market with 30x growth over the past decade.
Security is not just currently a hot topic; the field has had 0% unemployment for almost a decade.
This program will give you the foundation to kick-start your career in Cyber Security, a career which will offer you both interesting challenges as well as a solid career path.
Introduction and Overview of the Cybersecurity Landscape and Industry.
Basics of Computer and Device Hardware, Software, Operating Systems and Processes. Basics of Networking Traffic, Hardware Components and Topology. Network Communication Principles and Methods
Network and Routing Protocols / Services. Packet Level Traffic Analysis. Hands-on Operation of a Computer Network and Equipment, Monitoring and Analyzing Network Traffic Flow, Patterns and Performance. Hands-on Creation and Analysis of Critical Network Servers.
Hands-on Creation and Analysis of Telnet, Web, Data and Active Directory Servers. Hands-on Analysis of Network Topologies, Network Mapping and OS Fingerprinting. Telecommunication Concepts and Range. System and Network Admin Concepts, Management Principles and Controls. Hands-on Creation and Use of Virtual Machines and Bootable USB OS
Threats, attacks, Tactics
Overview of Threats, Classes, Attackers, Tactics, and Application Security Risks (OWASP). Hands-on Communications Security through Encrypting and Decrypting Data and Medias. Hands-on Backup and Recovery of Data, Devices and Servers. Network Security Principles, Methods, Protocols, Components and Architectures
Hands-on Assessment of Access Controls and Hardening Techniques to Ensure a Network’s Security. Hands-on Configuration and Utilization of a Firewall (on Windows, Linux and Hardware Firewall. Hands-on Configuration and Utilization of a Network/Host Intrusion Detection/Prevention System to Alert and Prevent Malicious Activity on a Network
Labs and simulations
Hands-on Configuration and Utilization of a Security Information and Event Management System to Correlate, Research, Analyze Logs and Provide Timely Detection of Misuse, Threats and Malicious Activity on the Network. Hands-on Malware Detection, Analysis, Isolation and Removal.
Cyber-Forensic Investigation Methodologies, Mindset, Tools Hands-on Forensics Investigation: Logs, System Files, Media, Memory Dump and Traffic Monitoring and Analysis.
Overview of Network Vulnerabilities, Associated Attacks; Ethical Hacking Methodologies, Stages, Principles, Tools and Techniques. Hands-on Conducting of Vulnerability and Compliance Scanning; and Correction Recommendation. Hands-on Performing Incident Response, Damage Assessment, Incident Triage, Tracking and Reporting
Projecs and simulations
Full Day Scenarios: Hands-on Protecting a Network from a Range of Cyber-Attacks (DDoS, SQL Injection, XSS, Ransomware, MiTM, ARP Poisoning, etc.)
Analysis of System Security and Organizational Posture Trends. Analysis of Cyber-Defense Trends and Staying at the Cutting Edge of the Industry. Performing of Security Design and Architecture Evaluation and Ensuing Recommendation
Labs and simulations
Hands-on Process of the Whole Chain of Custody for Handling Digital Evidence. Hands-on Performing of Static and Dynamic Analysis of Drive Images and other Data Sources, Recovery and Mitigation/Remediation of an Enterprise System.
Risk and Security Management Processes and Security Models. Cybersecurity and Privacy Principles. Advising on Disaster Recovery, Contingency and Continuity. Summary and Presentation by Bootcampers. Technical and Soft-Skill Preparation of a Job Interview. Final Hands-on Scenario.
Levereras i samarbete med:
Informator, som är en avtalsleverantör till Trygghetsrådet, kan i samarbete med Craft Academy, hjälpa dig med att välja rätt spår och strategi för ditt karriärskifte. Kontakta oss för ett vägledningsmöte.Nyckelord: säkerhet, security