Introduction to Cyber Security
Basics of Networking
OSI layer model
Summary including Q&A
The physical layer and vulnerabilities
Data Link Layer (IEEE Ethernet) – the 2nd Layer
The 3rd Layer and IP vulnerabilities
Summary including Q&A
The 4th Layer- Transportation Layers
Inspection and interception Tool – Hands-on
Internet working
Summary including Q&A
NAT – Topology hiding
Inspection and interception Tool – Hands-on
Applications Evolution and security issues
Summary including Q&A
Networking Issues
Basics of Security Management
MiTM challenge and confidentiality solutions
Summary including Q&A
Inspection and interception Tool – Hands-on
Offensive security: Kali Linux
Basic Linux commands
Summary including Q&A
Virtual Machines
Virtual Machines – Hands-on Part 1
Kali Linux – Hands-on Part 2
Summary including Q&A
Network and Vulnerabilities Scanning
NMAP – Hands-on
Summary including Q&A
OpenVAS for vulnerabilities scanning
OpenVAS - Hands-on
Summary including Q&A
Advanced Reconnaissance Tools
NCAT
Maltego
Summary including Q&A
Firewall
IPTables Firewall
Firewall - Hands-on Session
Summary including Q&A
Introduction to Cryptography
Symmetric Cryptography
Asymmetric Cryptography
Summary including Q&A
Certificates and Authentication process
Penetration Testing
Network Penetration
Summary including Q&A
Wireless Network penetration
Wireless Network penetration
Cloud Security
Summary including Q&A
Web Application
WAF – WEB Application Firewall
SQL Injection
Summary including Q&A
IDS/IPS and events detections
SIEM for Security Information and Event Management
SEIM
Summary including Q&A
Computer forensics
Business Continuity Management
Computer forensics
Summary including Q&A
Cyber Security in the Organization
Measuring Cyber Risks
Elevating data security in the organization
Case Study
Summary including Q&A
Introduction to AI
Neural networks
Statistic / Social AI
NLP- Natural language processing
Future of CRM/CEM
The End