SEC301: Introduction to Cyber Security
This five-day comprehensive course covers everything from core terminology to the how computers and networks function, security policies, risk management, a new way of looking at passwords, cryptographic principles, network attacks & malware, wireless security, firewalls and many other security technologies, web & browser security, backups, virtual machines & cloud computing. All topics are covered at an easy to understand introductory level. This course is for those who have very little knowledge of computers & technology with no prior knowledge of cyber security. The hands-on, step-bystep teaching approach enables you to grasp all the information presented, even if some of the topics are new to you. You'll learn real-world cyber security fundamentals to serve as the foundation of your career skills and knowledge for years to come.
- SEC301.1: Security's Foundation
- SEC301.2: Computer Function and Networking
- SEC301.3: An Introduction to Cryptography
- SEC301.4: Cyber Security Technologies - Part 1
- SEC301.5: Cyber Security Technologies - Part 2
In Person (5 days) / Online - Access Period: 4 months
- Keith Palmgren, Senior Instructor
What You Will Learn
- Communicate with confidence regarding information security topics, terms, and concepts
- Understand and apply the Principles of Least Privilege
- Understand and apply the Confidentiality, Integrity, and Availability (CIA) for prioritization of critical security resources
- Build better passwords that are more secure while also being easier to remember and type
- Grasp basic cryptographic principles, processes, procedures, and applications
- Understand how a computer works
- Understand computer network basics
- Have a fundamental grasp of any number of technical acronyms: TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS, and the list goes on.
- Utilize built-in Windows tools to see your network settings
- Recognize and be able to discuss various security technologies, including antimalware, firewalls, intrusion detection systems, sniffers, ethical hacking, active defense, and threat hunting.