Introduction to Cyber Security

Catalog Home Cybersecurity, Hacking & IT Auditing Cybersecurity
Your Training Location:  

Your quick start guide to Cyber Security.

Over the past few years the world has continued to watch as breach after breach has resulted in millions of credit card and personal information records being posted on the Internet. The Internet Storm Center reports an average of over 700,000 detected intrusion attempts daily – and that's only the events they catch.

There is no question that Cyber Security is a now a business priority and a prevailing global issue. The challenge lies in where to begin the daunting task of securing your infrastructure, training your end users and preparing your organization to face the year ahead. Introduction to Cyber Security is the foundational training for all users, whether management, IT, end user or programmer. Equip your team with the most up-to-date knowledge of the threats we all face and the hands-on skills to address them. With information gathered from the most trusted sources (CERT, NIST, DHS and others), this course presents an objective, complete, and cutting-edge view of our current environment as well as a vision of the near future of Cyber Security.

There are no prerequisites, however a basic understanding of computer and network terminology is recommended.

5 Days/Lecture & Lab

This course is designed for:

  • IT Administrators seeking an understanding of security threats and basic mitigation controls
  • Database Administrators desiring an increased security awareness
  • Managers of network resources who want an understanding of the current threat landscape
  • End Users needing a heightened awareness of Cyber Security

  • The Current Threat Landscape
  • The Hacking Cycle-Enumeration
  • TCP/IP Protocol Exploitation
  • DNS
  • DHCP
  • ICMP
  • Malware
  • Anti-Virus Software
  • Host Based Intrusion Detection
  • Spyware Protection
  • Defense-In-Depth
  • Intrusion Detection Systems
  • Stateful Firewalls
  • HoneyPots
  • Access Controls
  • Encryption

< >

Copyright © 2021 ProTech Professional Technical Services, Inc. All Rights Reserved.

Sign In Create Account


Social Media