×
Phoenix TS

Cyber Security and Embedded Sytems

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This  4 day, instructor led cyber security course explores the technical security skills and knowledge applied to web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, etc. Throughout the training, students should come to understand varied aspects of security, including the establishment of security objectives and policies in addition to the many technical tools necessary for organizational security and cyber safety. 

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

Course Objectives

By the end of this course, participants will be able to:

  • Identify and prioritize potential threats to your network 
  • Use basic networking knowledge to improve security 
  • Get inside the minds of hackers, so you can deter their attacks 
  • Implement a proven layered approach to network security 
  • Resist modern social engineering attacks 
  • Defend against today’s most common Denial of Service (DoS) attacks 
  • Halt viruses, spyware, worms, Trojans, and other malware 
  • Prevent problems arising from malfeasance or ignorance 
  • Choose the best encryption methods for your organization 
  • Compare security technologies, including the latest security appliances 
  • Implement security policies that will work in your environment 
  • Scan your network for vulnerabilities 
  • Evaluate potential security consultants 
  • Master basic computer forensics and know what to do if you’re attacked 
  • Learn how cyberterrorism and information warfare are evolving 

Course Outline

Module 1: Introduction to Computer Security  

Module 2: Networks and the Internet 

Module 3 Cyber Stalking, Fraud, and Abuse  

Module 4: Denial of Service Attacks  

Module 5: Malware  

Module 6: Techniques Used by Hackers 

Module 7: Industrial Espionage in Cyberspace  

Module 8Encryption  

Module 9Computer Security Software  

Module 10 Security Policies  

Module 11 Network Scanning and Vulnerability Scanning  

Module 12 Cyber Terrorism and Information Warfare  

Module 13 Cyber Detective  

Module 14Introduction to Forensics  

Module 15: Cyber Engineering 

Cyber Security and Embedded Systems Course Training FAQ”S

This course is intended for: 

  • Systems and Network Administrators 

Recommended Experience 

Before attending this course, students should have: 

  • Working knowledge of computer systems

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)