Course Overview

This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated in bachelor degree in any of the streams. Not just that it also helps to develop a career in IT infrastructure covering network fundamentals along with troubleshooting steps.

This program focuses on the essential of IT skills and knowledge needed to perform tasks commonly performed by entry-level IT professionals such as functions of Windows operating systems, establishing network connectivity, how to set up and install common peripheral devices to a laptop/PC.

You will learn principle of security that is to maintaining confidentiality, integrity, and availability of information and systems. We will also discuss various malware types, attack methods and sophisticated malware behavior.

Our IT and Cyber Security Fundamentals program ensures that all participants gain the knowledge and skills to:

  • Explain the purpose of a variety of networking concepts and implement them appropriately.
  • Design and implement functional networks.
  • Understand the concept with function of network devices such as switches, routers & wireless access point to segment network traffic.
  • Network troubleshooting methodology & appropriate tools to support connectivity & performance.
  • Summarize physical security & common attacks while securing the wired and wireless
    network.

Who would benefit from this course?

  • Students considering a career in Cyber Security.
  • Professionals working in fields that require a broad understanding of IT.
  • IT operations staff in IT-based organizations.

Course Duration – 30 hours

Course Outline
1 Information Technology Network
1.1 What it is? How it works?
1.2 Network Advantage of IT Networks
1.3 About Internet and How it works
1.4 OSI Layer
1.5 About TCP/IP, IP Classes and Subnetting
1.6 Local Area Network (LAN) & Wide Area Network (WAN)
1.7 Introduction to Network devices – switch & router
1.8 Internet Bandwidth and MPLS
1.9 Domain Name System
1.10 Dynamic Host Control Protocol
1.11 About Windows Active Directory and Domain Controller
1.12 Windows Registry, Task Manager & Services.
1.13 Trouble shooting tools or commands – netstat, ping, traceroute, nslookup & wireshark
1.14 Remote Access Tools – Anydesk, Webex, Zoom, showmypc, Teamviewer

2 Associated Risks with Cyber World and Security Technologies
2.1 About Computer Viruses / Malwares
2.2 Different Type of Cyberattacks
2.2.1 Ransomware
2.2.2 Bruteforce
2.2.3 Denial of Service & Distributed Denial of Service
2.2.4 SQL Injection
2.2.5 Cross site scripting
2.2.6 Phishing
2.2.7 Crypto-Mining & Crypto-Jacking
2.3 Vulnerabilities and Exploits
2.4 Discussing Some Cyber Breaches – Bangladesh Bank, Cosmos Bank, Sony Pictures & Equifax
2.5 How to Protect – Defence in depth with Cybersecurity Technologies
2.6 Introduction & Overview of Various Cybersecurity Technologies
2.6.1 Protecting Network with Next Generation Firewalls/ UTM
2.6.2 Protecting Workstation System with Endpoint Security (Traditionally Anti-Virus)
2.6.3 Protecting Data with Disk Encryption, File Encryption, and Data Loss Prevention (DLP)
2.6.4 Protecting Applications with Web Application Firewalls.
2.6.5 Scan /Filter Emails and Web Browsing Traffic.

Related Training

Information Security Management System ISMS

Information Security Management System (ISMS)

Implementer Professional for BS ISO/ IEC 27001:2013 Information Security Management System (ISMS)The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. The ISO 27001 standard is designed to function as a ...
Read More
Ethical-Hacking

Penetration Testing and Ethical Hacking

Course Overview Ethical hacking involves penetration testing where trained or experienced professionals attempt to penetrate a IT network or computer system as a service to the owner of the system to find security vulnerabilities which a hacker may be able ...
Read More
Network-Security-Abhiraksha.com

Network Security With Checkpoint Firewall

Course Overview We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. Organizations ...
Read More
System Protection - Abhiraksha.com

System Protection From Malwares

Course Duration - 18 hoursOur System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.This course provides an in-depth understanding of the tasks crucial to set ...
Read More
Security Analyst - Abhiraksha.com

Security Analyst

Cybersecurity Analyst is one of the high demand job roles by the reputed organizations for their security positions.Course OverviewA security analyst is a member of network security operations team  and is responsible to monitor as well as perform cyber incident  ...
Read More

Network Access Control

Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today ...
Read More
Data Protection - Abhiraksha.com

Data Protection

Course OverviewThis course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, ...
Read More

IT and Cybersecurity Fundamentals

Course Overview This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated ...
Read More