Cyber Essentials
A comprehensive program that explains core cyber technologies.
344 hours
Essentials
344 hours
Essentials

ABOUT THE PROGRAM

The recent media interest in cyber-attacks has raised the cyber sector’s profile. With significant investment from the big businesses and high salaries, many are now looking to the cyber world for their next role. With this heightened awareness and ever-changing challenges, the industry is expanding exponentially, and qualified professionals are in high demand. Unfortunately, a lack of basic cyber technologies knowledge puts an end to the dream of a cybersecurity career for many.
Operating systems are the basis of every IT system in the world. Enterprise end-users are typically Windows-based, and servers are generally Linux-based. The workstations are connected to these servers using TCP/IP protocols, and then there is the code developed by programmers. If you cannot understand all the links in this chain, it is impossible to talk cyber. All you can do is talk about cyber.
‘Cyber Essentials’ is an intensive practical program that contains everything you need to kickstart a career in the cyber sector. The course is also great for trainees looking to continue their preparation or gain professional certifications within the cyber and IT world.

The course covers the following topics:

DON'T TOUCH THIS TAB

It’s important to improve the accordion’s behaviour

Network Technologies
  • OSI and the TCP/IP protocol stack
  • Physical Layer and
  • Data-Link and Ethernet
  • Frame switching and switches
  • Network Layer, IPv4, VLSM, IPv6
  • ARP and DHCP
  • Routing protocols and routers
  • ICMPv4 and ICMPv6
  • Application Layer protocols: DNS, HTTP, SSH
  • Introduction to cryptography and VPN’s
Microsoft Domain Technologies
  • Windows client OS setup and configuration
  • Windows server OS setup and configuration
  • Active Directory setup and management
  • Managing users and groups
  • Managing processes and services
  • Using Group Policy to control settings and security
  • Windows Remoting
  • Windows Infrastructure services (DNS, DHCP, File and printer sharing)
  • Introduction to PowerShell
Linux
  • Linux overview
  • Setup Linux from scratch
  • Working with files and directories
  • Text processing
  • Regular expressions
  • Searching for files
  • Linux networking
  • Linux users and permissions
  • Package management and code compilation
  • Process Management
  • Linux services (web server, database, dhcp, ssh)
Check Point
  • Introduction to Check Point Technology
  • Deployment Platforms
  • Introduction to the Security Policy
  • Monitoring Traffic and Connections
  • Network Address Translation
  • Using Smart Update
  • User Management and Authentication
  • Introduction to Check Point VPNs
Building Tools with Python
  • Hello python
  • Expressions, data types, variables, and simple logic
  • Solving problems with python flow control, conditionals, and loops
  • Text processing, handling strings, lists and regular expressions
  • Functional programing, exception handling and better use of cmd interface
  • Generating dictionaries and working with files
  • Network programing` binding sockets, TCP and UDP clients and servers
  • Your 1st network scanner; host scans, port scans and banner grabbing
  • RAW traffic generation with scapy; ethernet, IP, ICMP, TCP and UDP
Introduction to cyber warfare
  • Hello Cyber
  • Offensive #1: DoS (denial of service)
  • Offensive #2: Information gathering
  • Offensive #3: Gaining privileges
  • Offensive #4: Injecting code
  • Offensive #5: binary exploitation
  • Worst-case scenario?
  • Targeted, multi-stage attack demonstration
  • The Cyber Attack Lifecycle (aka Cyber Kill Chain or MITRE ATT&CK)
  • Defense #1: blacklist known bad stuff
  • Defense #2: whitelisting the good stuff
  • Defense #3: strong authentication
  • Defense #4: “housekeeping” and asset management
  • Defense #5: behavioral security and anomaly detection
  • Defense #6: the human factor
  • LAB Project: defend a kingdom
  • Closing thoughts
Don't touch this tab
ABOUT SOTERIA GLOBAL

SOTERIA Global is a global leader in cyber-security training solutions and services.

The cyber world is now a part of our everyday life. New technology emerges daily, and as opportunities increase, so do cyber risks. Threats constantly evolve, and we must protect our valuable assets.

A successful cyber defense has many factors, but they all have one thing in common: dedicated, skilled individuals.

SOTERIA Global experts develop our solutions and rely on the best technological assets in the market. Our impressive global presence expands over four continents, giving us access to the best cybersecurity professionals.

Our solutions range from customized training programs to developing cyber-oriented facilities, ensuring that individuals and organizations are ready to face real-world threats. Over the years, we have worked with various organizations across many sectors, giving us the skillset to shape and adapt our solutions to meet our client’s needs.

COURSE INFO
    • Individuals with sound logical reasoning skills
    • Trainees motivated to pursue a career in the sector
    • User-level knowledge of computers and the Internet
    • Strong analytical skills (logical reasoning, problem solving)
    • Advanced level of English
    • Strong academic ability
    • Commitment to further study/practice outside the classroom
    • Prior experience of programming and managing Microsoft and/or communication networks is advantageous
    • Managing Microsoft based network
    • Basic Networking
    • Basic Linux administration
    • Familiarity with Firewalls management
    • Understanding the common attack vectors

INTERESTED? CONTACT US