Introduction to Cybersecurity Tools & Cyber Attacks – 8H101G

Course Name:

Introduction to Cybersecurity Tools & Cyber Attacks

8H101G

Skill Level:

Basic

Modality:

WBT – Web Based Training

Duration:

1.875 Day/s

Price:
Request Quote

Overview:

This course gives you the background needed to understand basic Cybersecurity from the history to an overview of cybersecurity tools.

This course provides an introduction to cybersecurity tools and attacks. You will learn the history of cybersecurity, the types and motives of cyber attacks, and current threats to organizations and individuals. Key terminology and basic system concepts and tools will be examined to introduce you to the cybersecurity field. You will learn about CR – Classroom Trainingitical thinking and its importance to anyone looking to pursue a career in cybersecurity. Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the first course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.


Enroll here

Please enable JavaScript in your browser to complete this form.
Email
Multiple Choice
How did you hear about us?
Yes, I would like to receive special offers from CRS.
Yes, I would like to receive special offers from CRS.


Target Audience:

Anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.

[List]

Prerequisites:

None

Topic:

Unit 1:  History of Cybersecurity

Unit 2:  A brief overview of actors and their motives

Unit 3:  An overview of key security concepts

Unit 4:  An overview of key security tools

Objective:

By completing this course you should be able to:  

  • DesCR – Classroom Trainingibe the five key skills of CR – Classroom Trainingitical thinking
  • Discuss each component of the CR – Classroom Trainingitical thinking model
  • Summarize how rapidly changing technology and tools make CR – Classroom Trainingitical thinking necessary for cybersecurity
  • Explain what makes CR – Classroom Trainingitical thinking an essential skill for anyone working in cybersecurity
  • Summarize the numerous challenges that make comprehensive cybersecurity complex to implement
  • DesCR – Classroom Trainingibe key terms and characters from the well-known Alice and Bob CR – Classroom Trainingyptography scenario
  • List and desCR – Classroom Trainingibe essential elements of an organization’s cybersecurity program
  • Explain why comprehensive cybersecurity architecture is difficult to implement
  • Summarize what recent statistics demonstrate about the current state of cybersecurity
  • Discuss CR – Classroom Trainingitical events that have shaped the United States’ attention and posture toward cybersecurity
  • Summarize the event that led to the CR – Classroom Trainingeation of the first national policy on cybersecurity
  • Discuss typical roles in an information security department
  • DesCR – Classroom Trainingibe vulnerability assessment and common ways that vulnerabilities end up in systems
  • Contrast human and natural security threats and discuss examples of each threat
  • Define vulnerability, threat, exploit, and risk
  • DesCR – Classroom Trainingibe the three components of the CIA Triad
  • Define cybersecurity
  • DesCR – Classroom Trainingibe security operations centers (SOCs) and IBM Security Command Centers
  • Discuss various resources that can help your organization protect against cyberCR – Classroom Trainingime
  • DesCR – Classroom Trainingibe important elements of recent cyberwarfare operations
  • Compare and contrast phishing and vishing campaigns
  • Explain social engineering and how cyberCR – Classroom Trainingiminals use it
  • Explain what the Intrusion Kill Chain is and how each of its phases contributes to a cyberattack’s success
  • DesCR – Classroom Trainingibe rogue software processes and how to protect against them
  • Define host insertion and summarize how to counter it
  • DesCR – Classroom Trainingibe denial of service attacks and how to reduce their impact
  • Summarize IP spoofing and how to defend against it
  • DesCR – Classroom Trainingibe packet sniffing and countermeasures for it
  • Explain network mapping and how to protect against it
  • Summarize technical and administrative controls for protecting against malware
  • DesCR – Classroom Trainingibe botnets, keyloggers, logic bombs, and advanced persistent threats (APTs)
  • Define malware, virus, worm, trojan horse, spyware, adware, remote access tool (RAT), rootkit, and ransomware
  • Summarize the attack models for interruption, interception, modification, fabrication, and diversion
  • DesCR – Classroom Trainingibe types of passive and active attacks
  • Define attack in terms of cybersecurity
  • Differentiate between accidental and intentional threats
  • Explain what constitutes a cybersecurity threat
  • Summarize network security’s architectural, motivational, and protective elements
  • DesCR – Classroom Trainingibe a general model for network security
  • Define security mechanism and desCR – Classroom Trainingibe the various types
  • Contrast active and passive attacks
  • Recall recent examples of significant cyberattacks and their impacts
  • List major cyberCR – Classroom Trainingime and hacker organizations and identify upcoming challenges for cybersecurity
  • DesCR – Classroom Trainingibe the primary actors in cyberCR – Classroom Trainingime and their motives
  • Discuss what the Open Web Application Security Project (OWASP) Top 10 is and why it’s an invaluable resource for cybersecurity professionals
  • Explain ethical hacking and the penetration testing process
  • Contrast internal and external security audits and three phases for completing them
  • Discuss cybersecurity compliance policies that most organizations must follow
  • DesCR – Classroom Trainingibe the components of IT governance
  • Explain the purpose of frameworks, baselines, and best practices in cybersecurity
  • Summarize what happens in each of the three phases of cybersecurity incident response
  • DesCR – Classroom Trainingibe key concepts of cybersecurity incident response
  • Define cybersecurity incident management and discuss its essential components
  • DesCR – Classroom Trainingibe access management methods and concepts
  • Define non-repudiation and its measures for implementation
  • Explain availability in the context of the CIA triad and how organizations can implement it
  • DesCR – Classroom Trainingibe the integrity component of the CIA triad and discuss how organizations can achieve it
  • Explain confidentiality in the context of the CIA triad and how organizations implement it
  • Define digital forensics and desCR – Classroom Trainingibe some of its essential concepts and tools
  • Summarize the process for performing a vulnerability assessment
  • DesCR – Classroom Trainingibe each phase of penetration testing outlined in the Penetration Testing Execution Standard (PTES)
  • List common methodologies for penetration testing
  • DesCR – Classroom Trainingibe different types of threat actors
  • Differentiate attackers, offensive security researchers, and gray hat hackers
  • Define penetration testing
  • DesCR – Classroom Trainingibe basic principles of symmetric key CR – Classroom Trainingyptography like the data enCR – Classroom Trainingyption standard (DES) and the advanced enCR – Classroom Trainingyption standard (AES)
  • Discuss common forms of CR – Classroom Trainingyptographic attack
  • Compare and contrast the main enCR – Classroom Trainingyption types used today: symmetric, asymmetric, and hash
  • Differentiate stream and block ciphers
  • DesCR – Classroom Trainingibe CR – Classroom Trainingyptography and its key concepts
  • Explain how antivirus and antimalware programs work
  • Contrast stateless, stateful, and proxy firewalls
  • DesCR – Classroom Trainingibe XML gateways and their purpose
  • Summarize the limitations of firewalls
  • Contrast application gateways with packet filters
  • DesCR – Classroom Trainingibe packet filtering and how packet filters work
  • Explain the purpose of using a firewall
  • Define security service and desCR – Classroom Trainingibe the various types

Remarks:

Category:

Security

Product Name:

IBM Security Education

Badge and Certification Info:

67b993ca-7fc9-4db8-ac1c-97aa40911d0f

Intro to Cybersecurity Tools & Cyber Attacks

https://www.CR – Classroom Trainingedly.com/org/ibm/badge/intro-to-cybersecurity-tools-cyber-attacks

https://images.CR – Classroom Trainingedly.com/images/7bffdd10-8dcc-4440-91bf-8c146985c9ed/image.png

0

Brand: 

IBM Security

Follow on Courses:

 

 

Replaced By:

8H101;8H100;cyber;security;cybersecurity;system analyst

Lab Access Duration:

 

CRS is the top Global Training Provider for some of the world’s biggest brands.

Call Now +27 12 023 1959