Introduction to Cyber Security Training Bootcamp
Introduction to Cyber Security Training Bootcamp course with hands-on labs
Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!
Introduction to Cyber Security Training Bootcamp Course, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training Bootcamp course is the answer.
Introduction to Cyber Security Training Bootcamp - Objectives
After completing this Introduction to Cyber Security Training Bootcamp course, attendees will be able to:
Upon completing this Introduction to Cyber Security Training Bootcamp course, learners will be able to meet these objectives:
• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
• Build a simple, but fully functional firewall configuration
• Secure your browser using a variety of security plug-ins
• Secure a wireless access point (also known as a wireless router)
• Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as "potentially unwanted".
• Access a number of websites to better understand password security, encryption, phishing, browser security, etc.