shape-876@2x

XE BASICS

Introduction to Cyber TIER 1

מספר הקורס 71592

16 שעות
2 מפגשים
* מספר המפגשים והשעות למפגש עשויים להשתנות בין קורס לקורס
calendar-1.svg

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים: Muzman@johnbryce.co.il

ספרו לי עוד

על הקורס בקצרה​

TIER 1 is an essential course covering main topics from the cyber world and allows the participants to view the complex world of digital crimes quickly.

This training covers the core concepts of defense and understanding in the practical world using the CYBERIUM ARENA simulator. Students will learn about different domain structures and security technology products.

hat.png

מטרות הקורס

Acquire the knowledge and tools to understand the corporate network

Understand cyber-attacks

Make better decisions in the corporate world

Protect your computer environment

Become familiar with different attack scenarios

kahal.png

למי מיועד הקורס

The course targets participants who wish to understand better the cyber world and corporate cybersecurity and cyber threats.

structure.png

תכנית הלימודים

syllabus
PDF להורדה

Module 1: Introduction to TIER 1

During this module, students will study the fundamental concepts of the cyber world. This module aims to allow students who do not have any background to understand the risks and approach their digital environment better.

  • Fundamentals Concepts in Information & Cyber Security
    • Definitions
    • Key Players
    • History and Future
    • Security Awareness
    • Type of Hackers
  • Cyber Basics
    • Basic Networking
    • Virtualization
    • Steganography and Ciphers
    • Hash Functions and Encodings

Module 2: Introduction to Linux

This module will take a closer look at the advantages and disadvantages of the Linux operating system. We will get familiar with Linux fundamentals and the bash scripting language.

  • Introduction to Linux
    • What is Linux
    • Linux Installation
  • Linux Terminal
    • Basic Commands and Tools
    • File System Structure
    • System Administrator
    • Permissions in Linux
    • Text Manipulation
    • Bash Scripting

Module 3: Cyber Defense

This module will dive deeper into the world of cybersecurity, the primary goal being to teach participants to embrace the attacker state-of-mind to recognize the necessary defense mechanisms. Participants will deal with several types of malware, spyware, and viruses, learn about hash functions and basic web attacks.

  • Basic Networking
    • OSI Model using Wireshark
    • DNS and DHCP – From an Attacker Point of View
  • Defense Concepts
    • Security Products
    • Anonymity on the Network
    • Concepts of Wi-Fi Security
  • Cyber Attacks
    • DDoS
    • MiTM Attacks
    • Brute Force and Mitigation Techniques
    • Trojan Methods: Reverse vs. Bind
    • Encryption and Decoding
requirements

Basic computer use

method

The courses at John Bryce Training allow you to gain experience with unique simulators and hands-on practice labs that include a variety of scenarios. Students are given the opportunity to put in practice what they have learned in order to retain all the relevant skills and information they were given throughout the course, this way upgrading their knowledge and expertise.

The simulator that is used in the hands on practice labs is The Cyberium system. This is an advanced cyber scenario simulator which has been developed by cyber experts who have been constantly involved in cyber training and in giving knowledge gaps solutions in the field of cyber. The simulator includes two main types of scenarios – educational and realistic.

Each educational scenario is focused on a different aspect of the course and simulates a specific aspect of the training topics. Each issue or topic taught in the course has a point exercise that allows the student to focus on it and deeply learn it.

The realistic scenarios simulate possible or past incidents related to Information Security. This includes everything from topics such as the Regulation of Cyber Systems to Attacks by Terrorist Hacker Organizations. These scenarios are broader than the educational exercises and require more of a systemic, strategic and comprehensive vision.

After each scenario, the system automatically generates detailed reports that serve as immediate feedback that allows the student and lecturer to measure the abilities, strengths, and weaknesses of the participant.

 

 

סימולטור
סימולטור – Cyberium Arena

Schedule Appointment

Fill out the form below, and we will be in touch shortly.

לא הצלחנו לאתר את הטופס.

בודק...