SD0113- Cybersecurity Fundamental

1. Introduction 

In this course, you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

The course concludes with key aspects of information risk and security management, in addition, summaries some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities as well as a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyses potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.

2. Course Objective

The objective of this course is to equipped students with the basic knowledge how to gather initial digital footprint and investigation as part of the competition. 

3. Course outcome 

After completed this course, the participants will be able to:

4. Pre-requirement of the participants 

The participant needs to have:

5. Course Outline 

Week 1

Time ContentOthers
Saturday
08.30 – 11:30Module 1 – Cyber Crime and AttackComputer related CrimesCyber AttackThreat Actor3h
Sunday
08.30 – 11:30Module 2 – Information SecurityInformation Security   PrincipleNecessity of Information SecuritySecurity Policy3h

Week 2

Time ContentOthers
Saturday
08.30 – 11:30Module 2 – Information SecurityThreats to informationRisk AnalysisTechnical Security Measure3h
Sunday
08.30 – 11:30Module 3 – Introduction to ISO 27001Standard and Control3h

Week 3

Time ContentOthers
Saturday
08.30 – 11:30Module 4 – Threats and VulnerabilitiesWhat is Threat?Threats on the network3h
Sunday
08.30 – 11:30Module 4 – Threats and Vulnerabilities Application Security3h

Week 4

Time ContentOthers
Saturday
08.30 – 11:30Module 5 – Unauthorized Access MethodsOutline UnauthorizedReconnaissance Stage3h
Sunday
08.30 – 11:30Module 5 – Unauthorized Access MethodsAttack StageDemo3h

Week 5

Time ContentOthers
Saturday
08.30 – 11:30Module 6 – Countermeasure on ServerDNS ServerWeb ServerMail ServerFTP3h
Sunday
08.30 – 11:30Module 7 – Detection of Unauthorized accessTCP DumpIDS (Snort)/IPSSyslog (system logger)Firewalls and Perimeter Defenses3h

Exit mobile version