Course Code: bezpit
Duration: 21 hours
Overview:

The "IT Security - Introduction" training is an invaluable source of knowledge for everyone eager to understand the complex world of cybersecurity. Through this course, participants will acquire skills not only in digital identity and information security but also master the fundamentals of computer networks, protocols, and firewalls. The course stands out with its practical approach, covering tools used in penetration testing as well as elements of risk management and incident response. Participating in the training will enable effective data protection, understanding of key threats, and enhancing competencies in cybersecurity, all of which contribute to greater security for organizations and individuals.

Course Outline:

INTRODUCTION TO CYBERSECURITY

  1. Overview
  2. Digital Identity and OSINT (Open-Source Intelligence)
  3. Information Security
  4. Element Information Security Principles (Confidentiality, Integrity, Availability, Authentication, and Non-repudiation)
  5. Why and How Hackers Attack? (Motive --> Objective --> Method --> Vulnerability) and Types of Attacks
  6. Cybersecurity Attack Chain (Cybersecurity Kill Chain) and Methodology and TTPs (Techniques, Tactics, and Procedures)
  7. Ensuring Information Security (IA - Information Assurance)
  8. Risk Management and Incident Handling
  9. Summary (including laws and reports)

CYBERSECURITY FUNDAMENTALS

  1. Network Basics
  2. Network Protocols, Ports, and OSI Model
  3. Practice Time
  4. Firewalls, DMZ (Demilitarized Zone), IDS (Intrusion Detection System), and IPS (Intrusion Prevention System)
  5. Data Encryption (why it's needed? basics, system-based, file-based, hash functions, PGP methods)
  6. Backups
  7. Passwords (including password management)
  8. Practice and Demonstration

CYBERSECURITY TOOLS

  1. Social Engineering (Phishing, Vishing, and others)
  2. Virtualization and Understanding Risks Associated with Virtualization
  3. Fundamentals of Linux
  4. Basic Penetration Testing Tools
  5. Demonstrating and Practicing Penetration Testing and Reporting
  6. Summary
Sites Published:

Polska - Bezpieczeństwo IT - wprowadzenie