Certified Cybersecurity Professional
The Programme
This Certified Cybersecurity Professional certification program will immerse participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Many courses have cropped up offering training in so-called “ethical hacking”. But these courses deal with only one half of the security equation. To build highly secure networks, professionals need to be aware of different methods of hacking and at the same time know how to make networks secure from these intrusions using firewalls, UTMs, antivirus, etc. This is the only course which teaches both hacking and countermeasure techniques.
The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed.
Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. Participants will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a participant leaves this intensive 10day class they will have hands on understanding and experience in Ethical Hacking.
The tools and techniques that you will learn are not confined to any particular vendor or platform. The aim of this program is to train the ethical hacker of tomorrow who is equally at ease in protecting the conventional or the latest cutting-edge network.
Programme Objective
Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
- To understand hacking and penetration testing activities.
- A guide to using these skills to get a better job and make money online as a freelancer.
- A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
Programme Learning Outcome
Explain the threat landscape and break down two (2) the types of threats and vulnerabilities
- Learn how attacks are identified and how defensive cybersecurity responses are established
- Discuss three (3) key components and sequences of incident response frameworks
- Respond and mitigate two (2) risks associated with Operational Technology (OT) and Internet of Things (IoT) devices
- Discuss artificial intelligence (AI) techniques and how they relate to the cyber environment
Programme Delivery Methodology:
Face to Face or Online Training
- Practical/ Lab Exercise
- eCoaching
Duration:
5 days
Entry Requirement
Basic understanding of IT
Assessment Method
Candidates will need to sit for computerized examination for 1.5 Hours and the various practical exercise.
Learning Materials
There will be a student manual and lab workbook for each participant provided by US Council
Course Outline
Module 1: Security Risk Assessment (Ethical Hacking)
- Introduction To Ethical Hacking
- Footprinting
- Scanning
- Proxy
- Hacking Web Servers & Web Applications
- Session Hijacking
- Denial Of Service
- System Hacking
- Sniffers
- Phishing
- Malware wireless Hacking
- Kali Linux
Module 2: Proactive Defense And Countermeasures
- Introduction To Security
- Firewalls
- Intrusion Prevention Systems
- Virtual Private Networks
- High Availability Virtual / Cloud Devices Security Host Security
Module 3: Incident Response And Management
- Siem
- Incident Response
- Mobile Forensics
Module 4: Ot & Iot Risk
- Learn to identify risks associated with Operational Technology (OT) and Internet of Things (IoT) devices and able to mitigate risks associated with Operational Technology (OT) and Internet of Things (IoT) device.
- Impact of AI
- Cyber Hygiene
Duration
5 Days