Skip to main content

Introduction to Cyber Security

Your quick start guide to Cyber Security.

Over the past few years the world has continued to watch as breach after breach has resulted in millions of credit card and personal information records being posted on the Internet. The Internet Storm Center reports an average of over 700,000 detected intrusion attempts daily – and that's only the events they catch.

There is no question that Cyber Security is a now a business priority and a prevailing global issue. The challenge lies in where to begin the daunting task of securing your infrastructure, training your end users and preparing your organization to face the year ahead. Introduction to Cyber Security is the foundational training for all users, whether management, IT, end user or programmer. Equip your team with the most up-to-date knowledge of the threats we all face and the hands-on skills to address them. With information gathered from the most trusted sources (CERT, NIST, DHS and others), this course presents an objective, complete, and cutting-edge view of our current environment as well as a vision of the near future of Cyber Security.

Request Course Details

Attending students will learn

  • „ Overview of the Hacking Cycle
  • „ Phases of Network Reconnaissance
  • „ Use and Methodology of Network Scanning Tools
  • „ DNS Analysis and Manipulation
  • „ Malware Types
  • „ Defensive Postures
  • „ Security Appliance Types and Uses
  • „ Defense in Depth Model
  • „ Access Control Mechanisms
  • „ Authentication Protocol Types and Uses
  • „ Encryption Protocol Types and Uses
  • „ VPN Protocol Types and Uses

Who should attend

  • IT Administrators seeking an understanding of security threats and basic mitigation controls
  • Database Administrators desiring an increased security awareness
  • Managers of network resources who want an understanding of the current threat landscape
  • End Users needing a heightened awareness of Cyber Security


  • There are no prerequisites, however a basic understanding of computer and network terminology is recommended

Course Outline

Day 1

  • The Current Threat Landscape
  • The Hacking Cycle-Enumeration

Day 2

  • TCP/IP Protocol Exploitation
  • DNS
  • DHCP
  • ICMP

Day 3

  • Malware
  • Anti-Virus Software
  • Host Based Intrusion Detection

Day 4

  • Spyware Protection
  • Defense-In-Depth
  • Intrusion Detection Systems
  • Stateful Firewalls
  • HoneyPots

Day 5

  • Access Controls
  • Encryption

Courses That Follow

REQUEST MORE INFO about this course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...