Cybersecurity Bootcamp
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
This course explains Cyber Security and the role of Specialistcovers the fundamental building blocks of your required skill set – You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
you will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Explore the threat landscape – Darknets, dark markets, zero-day vulnerabilities, exploit kits, malware, phishing, and much more.
- Master encryption in an easy-to-follow crash course, We cover operating system security, privacy, and patching – On Windows 7, Windows 8, Windows 10, MacOS, and Linux.
- Start a career in cyber security. Become a cyber security specialist.
- An advanced practical skillset in defeating all online threats – advanced hackers, trackers, malware, and all Internet nastiness including mitigating government spying and mass surveillance.
- Start a career in cyber security. Become a cyber security specialist.
- Gain the very latest up-to-date information and methods. Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix, and Qubes OS.
- Learn about nation-state secret tracking and hacking infrastructure.
-
COURSE AUDIENCE
This course is made for:
- Who wants to keep their precious files, emails, accounts, and personal information out of the hands of the bad guys.
- Beginners and intermediate Internet users who are interested in security, safety, and privacy.
- Who want privacy and anonymity online from hackers, corporations, and governments.
- Anyone who wants to become an expert in security, privacy, and anonymity. This volume covers the required foundation building blocks of that skill set.
- Personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy, and anonymity.
- For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals, and all online threats.
-
COURSE OUTLINE
Day One:
- Hardware and Operating System Fundamentals
- Networking Fundamentals
Day Two:
- Security Fundamentals
- Security Bootcamp – Project A
Day Three:
- Python Programming – Introduction
- Security Bootcamp – Project B
Day Four:
- Ethical Hacking (CEH)
- Security Bootcamp – Project C
Day Five:
- Choose a module
- CompTIA Cybersecurity Analyst
- CompTIA PenTest
- Capstone Project
Keyword
Training Subject
Training Location