
Course Outline
By the end of this course, you will learn:
● CIA (Confidentiality, Integrity, and Availability) triad of information security which is an information security benchmark model used to evaluate the information security of an organization
● Computer and network functions
● Common security technologies
● Common data protection protocols
● Introduction to Cyber Security and mitigation approaches
● Incident Handling
● Discuss about any one of the already acquired skill from security perspective and it’sapplication in context to Cyber Security
Course Severity – Intermediate
Course Duration – 25 Hours
Class Requirements
- A Windows/Mac PC/Laptop capable of virtualization
- Basic knowledge of IP addressing, familiarization with ports and services, configuring network adapter, PING, IFCONFIG, IPCONFIG
- Reliable LAN or cable connection for Internet access
- Host machine running Windows 10 or Mac
- You should have a minimum of 4 GB of RAM (8 GB preferred)