Wibena Business Institute

Cybersecurity

CCM 001: INTRODUCTION TO CYBERSECUTIY

Course Overview

This introductory course takes you inside the world of cybersecurity. You will learn cybersecurity basics to protect your personal digital life and gain insights into the biggest security challenges companies, governments, and educational institutions face today. Cybersecurity professionals who can protect and defend an organization’s network are in high demand.

Cybersecurity objective

The program structure aims to familiarize learners with:

  • The present cyber-security landscape and offer them the knowledge of pertinent and appropriate tools to enable them to evaluate and control security protocols in the concerned information processing systems.
  • It will equip the Learners with the skills to perform business impact analysis and disaster recovery testing.

MODULES:

  • The World of Cybersecurity
    1. What is Cybersecurity
    2. Protecting your Personal Data
    3. Your online identity
    4. Your data
    5. Where is your data
    6. What’s More…
    7. Smart Devices
    8. What Do Hackers Want?
    9. Identity Theft
    10. Who Else Wants My Data?
  • Organizational Data
    1. Types of Organizational data
    2. The cube
    3. What do you think
    4. Is this for Real
    5. Data Security breaches
    6. Consequence of a Security Breach
  • what was taken
    1. Scenario 1
    2. What happened?
    3. Scenario 2
    4. What exploits
    5. Rewind
    6. Key takeaways
    7. Find out More
  • Cyber attackers
    1. Types of Attackers
    2. What color is My at?
    3. Internal and External Threats
    4. What Do You think?
  • Cyberwarfare
    1. Signs of the Times(Stuxnet)
    2. The purpose of Cyberwarfare
  • Analyzing a Cyber Attack
    1. Types of malware
    2. Symptoms of malware
    3. What do you think
  • Methods of Infiltration
    1. Social Engineering
    2. Denial-of-Service
    3. Distributed DoS
    4. Botnet
    5. On-Path Attacks
    6. SEO poisoning
    7. Wi-Fi Password Cracking
    8. Password Attacks
    9. Cracking Times
    10. Advanced persistent Threats
    11. It’s Over to You…
  • Security Vulnerability and Exploits
    1. Hardware Vulnerabilities
    2. Software Vulnerabilities
    3. Categorizing Software Vulnerabilities
    4. Software Updates
    5. What Do You Think?
  • The Cybersecurity Landscape
    1. Cryptocurrency
    2. Crypto jacking
  • Protecting Your Devices and Network
    1. What Do you Think
    2. Protecting your Computing Devices
    3. Wireless Network Security at Home
    4. Public Wi-Fi Risks
    5. Password Security
    6. A Strong Password
    7. Using a Passphrase
    8. Password Guidelines
    9. Password Check
  • Data Maintenance
    1. What is Encryption?
    2. How Do You Encrypt your Data?
    3. Back Up Your Data
    4. Are They Really Gone?
    5. How Do You Delete Your Data Permanently?
  • Who Owns your Data
    1. Terms of Service
    2. Understand the Terms
    3. What Are You Agreeing To?
    4. The Data Use Policy
    5. Privacy Settings
    6. Before You Sign UP
    7. Protect your Data
  • Safeguarding Your Online Privacy?
  1. Two-factor authentication
  2. Open Authentication
  3. Social Sharing
  4. Don’t get spoofed
  5. Email and Web Browser Privacy

 4.1 Cybersecurity devices and technologies

  1. Security Appliances
  2. Which is it?
  3. Firewalls
  4. Which one?
  5. Port Scanning
  6. What Does It Mean?
  7. Intrusion Detection and Prevention Systems
  8. Real-Time Detection
  9. Protecting against Malware
  10. Security Best Practices

 4.2 Behaviour approach to cybersecurity

  1. Behavior-Based Security
  2. Net flow
  3. Penetration testing
  4. Your turn
  5. Impact Reduction
  6. What is Risk Management?

 4.3 Cisco Approach to Cybersecurity

  1. Cisco’s CSIRT
  2. Security Playbook
  3. Tools for Incident Detection and v Prevention
  4. Cisco’s ISE and TrustSec
  5. Talk the Talk

5.1 Legal and Ethical Issues

  1. Legal Issues in Cybersecurity
  2. Ethical issues in Cybersecurity
  3. How did you answer
  4. Corporate Ethical Issues

5.2 Education and Careers

  1. Become a Cybersecurity Guru   
  2. Professional Certifications
  3. Cybersecurity Career Pathways
  1. Apply the concepts learned throughout the course to a real-world security problem
  2. Use appropriate tools and techniques
  3. Present solutions in an organized and effective manner

Certification's Partners

Accreditation Partners

Newsletter

Join our newsletter for latest Updates