About Course
By the end of this course, participants will be able to:
- State the basic requirements for securing Operating Systems
- Demonstrate basic knowledge of network and data transmission standards
- Demonstrate basic knowledge of the legal dimensions related to cyber security
- Describe the causes of cyber security risk and attack vectors
Course Content
- Introduction to Cyber Security
- What is Cyber Security
- The advent of the Digital Age
- The ubiquitous nature of network connectivity
The internet of things
Operating Systems
- Types of Operating Systems
- Managing users, groups, resources and hardware
- Principles of Hardening Operating Systems
- Supervisory Control and Data Acquisition (SCADA) systems
Networking Fundamentals
- Basic concepts in Communications and Networking
- Transmission Medium (Network Cables and wireless)
- Network Hardware
- Wide Area Networks (WAN) and Local Area Networks (LAN)
- Network Protocols
- Ethernet topologies and technologies; Networking components
- An introduction to Virtual LANs; Internet Protocol (IP) routing concepts
- 802.11 industry networking standards
Cyber Security Regulations, Compliance and Auditing
- Laws and regulations
- Data regulations – GDPR
- Understanding professional ethics
- Understanding compliance requirements and procedures
- Access reviews and audits-and internal audit of capability
- Education, training and awareness requirements
Cyber Security Threats and Risks
- Bring Your Own Device (BYOD)
- Cloud, The ‘Internet of Things’ and intelligent networked devices
- Bot Net/Distributed Denial of Service
- Social Networks, Mobile Apps
- Click Jacking/Cross Site Scripting
- Phishing, Online Fraud
- Convergence Gaps-Physical Theft
- Hacking, Insider and Data Exfiltration
- Social Engineering/Espionage
- Organisational Awareness, ID Theft
- Virus/Targeted Malicious, Advanced Persistent Threats
Pre-requisite for Course Registration
Participants should have basic knowledge of office computer use.
Student Ratings & Reviews
No Review Yet