Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.
Course Overview
This 4 day, instructor led cyber security course explores the technical security skills and knowledge applied to web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, etc. Throughout the training, students should come to understand varied aspects of security, including the establishment of security objectives and policies in addition to the many technical tools necessary for organizational security and cyber safety.
Schedule
Cyber Security and Embedded Sytems
date
location
price
Course Objectives
By the end of this course, participants will be able to:
- Identify and prioritize potential threats to your network
- Use basic networking knowledge to improve security
- Get inside the minds of hackers, so you can deter their attacks
- Implement a proven layered approach to network security
- Resist modern social engineering attacks
- Defend against today’s most common Denial of Service (DoS) attacks
- Halt viruses, spyware, worms, Trojans, and other malware
- Prevent problems arising from malfeasance or ignorance
- Choose the best encryption methods for your organization
- Compare security technologies, including the latest security appliances
- Implement security policies that will work in your environment
- Scan your network for vulnerabilities
- Evaluate potential security consultants
- Master basic computer forensics and know what to do if you’re attacked
- Learn how cyberterrorism and information warfare are evolving
Course Outline
Module 1: Introduction to Computer Security
Module 2: Networks and the Internet
Module 3: Cyber Stalking, Fraud, and Abuse
Module 4: Denial of Service Attacks
Module 5: Malware
Module 6: Techniques Used by Hackers
Module 7: Industrial Espionage in Cyberspace
Module 8: Encryption
Module 9: Computer Security Software
Module 10: Security Policies
Module 11: Network Scanning and Vulnerability Scanning
Module 12: Cyber Terrorism and Information Warfare
Module 13: Cyber Detective
Module 14: Introduction to Forensics
Module 15: Cyber Engineering
Cyber Security and Embedded Systems Course Training FAQ”S
This course is intended for:
- Systems and Network Administrators
Recommended Experience
Before attending this course, students should have:
- Working knowledge of computer systems
Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.