In this intermediate-level cybersecurity course, participants will gain a comprehensive understanding of cybersecurity risks and mitigation strategies. This course is designed for individuals who have a basic understanding of computer systems and are interested in learning about cybersecurity concepts and practices. Through interactive discussions, case studies, and hands-on activities, participants will explore various cybersecurity topics and develop essential skills for protecting digital assets and information.
Objectives:
Gain an understanding of cybersecurity fundamentals and terminology.
Learn about the laws, regulations, and standards related to cybersecurity.
Identify common cyber threats and trends, including phishing attacks and malware.
Explore the impact of security breaches on organizations and ways to mitigate risks.
Examine emerging technologies and their implications for cybersecurity.
Develop incident response and threat detection skills.
Learn about the importance of event logs and how to interpret them.
Understand the components of an incident response plan and the role of an incident response team.
- Cyber Attack Game: Participation in a simulated cyber-attack scenario to grasp the complexities and challenges faced by organizations.
Day 2 (May 21, 2024)
09:00 - 10:30Morning Session
- Sensitive Information Discovery - Identification and protection of sensitive information
- Phishing attacks
10:30 - 10:55BREAK
11:00 - 13:00Mid-Morning Session
- Operating Systems (OS) Hacking (Windows/Linux/ UNIX)
13:00 - 13:55LUNCH
14:00 - 17:00Afternoon Session
- Emerging Technology: cybersecurity implications of emerging technologies (Mobile Computing, Social Media, Artificial Intelligence, Cloud Computing, Consummerization of IT, Blockchain, Big Data and Analytics )
Day 3 (May 22, 2024)
09:00 - 10:30Morning Session
- Types of cyber attacks
10:30 - 10:55BREAK
11:00 - 13:00Mid-Morning Session
- Impact of security breaches and ways to mitigate the same
13:00 - 13:55LUNCH
14:00 - 17:00Afternoon Session
- Cybersecurity Challenges
Day 4 (May 23, 2024)
09:00 - 10:30Morning Session
- Understanding Events Logs
10:30 - 10:55BREAK
11:00 - 13:00Mid-Morning Session
- Threat Detection
13:00 - 13:55LUNCH
14:00 - 17:00Afternoon Session
Incident Response Planning
Day 5 (May 24, 2024)
09:00 - 10:30Morning Session
Incident Containment & Eradication
10:30 - 10:55BREAK
11:00 - 13:00Mid-Morning Session
- Course Conclusion: Review of learning objectives, Q&A session, and certificate presentation.