Choose another country to see content specific to your location

//Select a site

Advanced Cyber Security Professional

Understand the basic concepts associated with Cyber Security and know what your organisation needs to stay secure

About the course

The Advanced Cyber Security concepts skill path goes beyond the topics covered in entry-level security courses. Every organisation is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection but also increase efficiency and productivity. This Advanced Cyber Security Professional course will help candidates understand the different types of malware and security breaches and develop effective prevention methods to improve overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure.  

your benefits

  • Learn advanced techniques to support people/organisations to secure their cyber workspaces
  • Gain the requisite skills and knowledge about network security 
  • Become part of the growing Cyber Security fraternity  
  • Get recognition by peers and employers
  • Enhance your employability

COURSE CONTENT/OUTLINE

  • Introduction to Cyber Security

Cyber security frameworks - MITRE, NIST
CIA triad
Top 10 common attacks

  • OS Security

• Windows CLI (PowerShell)
• PowerShell Scripting
• Linux CLI
• Bash Scripting
• Windows Hardening - Mosse Security automation

  • Cryptography and Encryption 

• Introduction to Cryptography
• Encryption – Writing Basic python script
• Hashing – Introduction to hashing, use of Hash in real world examples, writing bash script for automation
• Encoding – Introduction, use cases

  • Types of Malware
  • Worms, Virus, Spyware, Trojans case studies
  • Web Application Security

Introduction to OWASP
OWASP top 10
Hacking web-application Juice Shop
Setting up local lab Installation of LAMP stack, Config vwa app, Hacking application

  • System Hacking
Hacking into Windows – Using Metasploit Framework, Using PowerShell Empire Framework
C2 [Command and Control Servers] – Covenant C2, Installation & run, Amsi.fail for bypass windows security
  • System Security

• Event logs
• Antivirus / Anti-malware scanning
• SIEM for log detection
• Splunk introduction and basics

  • Advance Exploitation

• Vulnerability scanning
• Active Directory
i. Installation and Configuration
ii. Enumerate users using kerbrute
• Handling Public Exploit
i. ZeroLogon
ii. OMIGOD exploit
iii. Eternalblue
• Privilege Escalation

  • Malware Analysis

• Using online tools 
    i. Hybrid analysis
    ii. Virus total
• Introduction to REMnux
• Using Yara Rules
    i. Introduction to Yara rules
    ii. Using Yara rules
    iii. Config Thor for automated Yara detection
    iv. Writing custom Yara rules.
• Analysis of Malware executable
• Analysis of malware document file

  • Data Breaches

• What is data breach?
• Finding breached data
    i. Pwndb
• Phishing
    i. Introduction
   ii. Setting up lab
   iii. Running a phishing Attack.
• Email spoofing 
   i. How to?
   ii. Send a spoofed email
   iii. Mitigation 

  • Social Security

• Privacy policy
• What google knows about you?
• GDPR
• Using GDPR for requesting data

  • Prevention Software

• Firewall
• VPNs
• SIEM (Splunk) - Installation
• Use of Pub Key Auth with online server

  • Wrapping-up

• Words from the wise
• Lessons learnt
• Q&A

WHO SHOULD ATTEND?

This course can be attended by security officers, auditors, security professionals, website administrators, anyone who is concerned about the security of their network infrastructure and everyone who want to have a promising career in cyber security. 

TRAINING DURATION

2.5 days

Pre-requisites

• Basic Programming (Python, PHP, MySQL)
• Understanding of Networking protocols & topology
• System Command lines (PowerShell & Bash/ZSH)

examination and Evaluation

Duration: 120 mins MCQ/LAB

Participants will be assessed throughout the course for punctuality, interactive approach, involvement, role-play, and finally through a written examination at the end of the course. The examination is ‘closed book’ 

CERTIFICATION

Passing criteria: 70%. Candidates who score minimum or above 70% will be issued TÜV SÜD’s “Advanced Security Professional” certificate.

Next Steps

Site Selector