top of page

Introduction to Cyber Security, information

security fundamentals 

 
 
 
 
 
 
 

Hands on Cyber security training by experts in the space.

 
 

5 weeks

 
 

The courses provides a comprehensive introduction to cyber security and it ends with hands-on simulator training. 

 
 
certificate.jpg
CWISF.png

Information Security Fundamentals

CWISF​

Image by Redd

Course overview

Introduction 

 
 
 
 
 
 
 

Understanding Cyber Security has become a minimum requirement

at any workplace 

 
 
 
 
 
 
 

Be more Cyber Security aware and less at risk. ​

​

​Get practical, hands on knowledge and understanding of the threats.

​

​Become more employable and take an active role in the protection of your environment.

 
david.png

David

Our trainers

 
 
 
 
 
 

An accredited expert and focal point of knowledge in information security and cyber operations with over 15 years of experience in hi-tech and startups. Researches, explores, trains, and instructs on cyber security topics, engages with military, government and enterprise customers worldwide.

 

A senior trainer to special forces and secret services worldwide.

 

SKILLS Cyber security research ✦ Cyber operations and warfare ✦ Forensics ✦ SCADA security ✦ Consulting and Training.

 
 
 

The labs hold questions and tasks to support the training.

Labs

 
 
 

The coursebooks accompany the lecturers and students alike in cybersecurity studies.

Book

 
 
 

Provide participants possible situations from cybersecurity or cyberterrorism to solve.

Scenarios

 
 

Trainees must complete a practical built-in project, produce defense and assault tools.

Project

 
 

Introduction

 

Module One:

 

Fundamentals Concepts

 

Definitions

 

Key Players

 

History and Future

 

Security Awareness

 

​

Cyber Job Roles

 

Basic Networking

 

Remote Access

 

Steganography and Ciphers

 

Hash Functions and Encodings​

Cyber Security

 

Module Two:

 

Cyber Concepts

 

OSI Model

 

DNS and DHCP – From an Attacker Point of View

 

Security Products Explained

 

Anonymity on the Network

​

Concepts of Wi-Fi Security

 

Cyber Attacks Demos

 

MiTM Attacks

 

Brute Force

 

Phishing

 

Trojans

Our Labs and Simulator

 
The simulator offers a three-sixty solution, including labs, books, reports, projects, and international certifications preparation. It is a high-end simulator focused on cybersecurity training issues such as cyber-attacks and operations technology; through these scenarios, participants are trained.
bottom of page