BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
This 4 day, instructor led cyber security course explores the technical security skills and knowledge applied to web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, etc. Throughout the training, students should come to understand varied aspects of security, including the establishment of security objectives and policies in addition to the many technical tools necessary for organizational security and cyber safety.
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Course Objectives
By the end of this course, participants will be able to:
- Identify and prioritize potential threats to your network
- Use basic networking knowledge to improve security
- Get inside the minds of hackers, so you can deter their attacks
- Implement a proven layered approach to network security
- Resist modern social engineering attacks
- Defend against today’s most common Denial of Service (DoS) attacks
- Halt viruses, spyware, worms, Trojans, and other malware
- Prevent problems arising from malfeasance or ignorance
- Choose the best encryption methods for your organization
- Compare security technologies, including the latest security appliances
- Implement security policies that will work in your environment
- Scan your network for vulnerabilities
- Evaluate potential security consultants
- Master basic computer forensics and know what to do if you’re attacked
- Learn how cyberterrorism and information warfare are evolving
Course Outline
Module 1: Introduction to Computer Security
Module 2: Networks and the Internet
Module 3: Cyber Stalking, Fraud, and Abuse
Module 4: Denial of Service Attacks
Module 5: Malware
Module 6: Techniques Used by Hackers
Module 7: Industrial Espionage in Cyberspace
Module 8: Encryption
Module 9: Computer Security Software
Module 10: Security Policies
Module 11: Network Scanning and Vulnerability Scanning
Module 12: Cyber Terrorism and Information Warfare
Module 13: Cyber Detective
Module 14: Introduction to Forensics
Module 15: Cyber Engineering
Cyber Security and Embedded Systems Course Training FAQ”S
This course is intended for:
- Systems and Network Administrators
Recommended Experience
Before attending this course, students should have:
- Working knowledge of computer systems
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org