Course Overview
This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated in bachelor degree in any of the streams. Not just that it also helps to develop a career in IT infrastructure covering network fundamentals along with troubleshooting steps.
This program focuses on the essential of IT skills and knowledge needed to perform tasks commonly performed by entry-level IT professionals such as functions of Windows operating systems, establishing network connectivity, how to set up and install common peripheral devices to a laptop/PC.
You will learn principle of security that is to maintaining confidentiality, integrity, and availability of information and systems. We will also discuss various malware types, attack methods and sophisticated malware behavior.
Our IT and Cyber Security Fundamentals program ensures that all participants gain the knowledge and skills to:
- Explain the purpose of a variety of networking concepts and implement them appropriately.
- Design and implement functional networks.
- Understand the concept with function of network devices such as switches, routers & wireless access point to segment network traffic.
- Network troubleshooting methodology & appropriate tools to support connectivity & performance.
- Summarize physical security & common attacks while securing the wired and wireless
network.
Who would benefit from this course?
- Students considering a career in Cyber Security.
- Professionals working in fields that require a broad understanding of IT.
- IT operations staff in IT-based organizations.
Course Duration – 30 hours
Course Outline
1 Information Technology Network
1.1 What it is? How it works?
1.2 Network Advantage of IT Networks
1.3 About Internet and How it works
1.4 OSI Layer
1.5 About TCP/IP, IP Classes and Subnetting
1.6 Local Area Network (LAN) & Wide Area Network (WAN)
1.7 Introduction to Network devices – switch & router
1.8 Internet Bandwidth and MPLS
1.9 Domain Name System
1.10 Dynamic Host Control Protocol
1.11 About Windows Active Directory and Domain Controller
1.12 Windows Registry, Task Manager & Services.
1.13 Trouble shooting tools or commands – netstat, ping, traceroute, nslookup & wireshark
1.14 Remote Access Tools – Anydesk, Webex, Zoom, showmypc, Teamviewer
2 Associated Risks with Cyber World and Security Technologies
2.1 About Computer Viruses / Malwares
2.2 Different Type of Cyberattacks
2.2.1 Ransomware
2.2.2 Bruteforce
2.2.3 Denial of Service & Distributed Denial of Service
2.2.4 SQL Injection
2.2.5 Cross site scripting
2.2.6 Phishing
2.2.7 Crypto-Mining & Crypto-Jacking
2.3 Vulnerabilities and Exploits
2.4 Discussing Some Cyber Breaches – Bangladesh Bank, Cosmos Bank, Sony Pictures & Equifax
2.5 How to Protect – Defence in depth with Cybersecurity Technologies
2.6 Introduction & Overview of Various Cybersecurity Technologies
2.6.1 Protecting Network with Next Generation Firewalls/ UTM
2.6.2 Protecting Workstation System with Endpoint Security (Traditionally Anti-Virus)
2.6.3 Protecting Data with Disk Encryption, File Encryption, and Data Loss Prevention (DLP)
2.6.4 Protecting Applications with Web Application Firewalls.
2.6.5 Scan /Filter Emails and Web Browsing Traffic.
Information Security Management System (ISMS)
Read More
Penetration Testing and Ethical Hacking
Read More
Network Security With Checkpoint Firewall
Read More
System Protection From Malwares
Read More
Security Analyst
Read More
Network Access Control
Read More
Data Protection
Read More
IT and Cybersecurity Fundamentals
Read More