CYBER SECURITY

Training Courses

Cyber Essentials

Cyber Essentials is a comprehensive program that explains core cyber technologies.

The recent media interest in cyber-attacks has raised the cyber sector’s profile. With significant investment from big businesses and high salaries offered, many professionals are looking into the cyber domain for a career path shift. The industry is expanding exponentially, creating the hottest demand for qualified Cyber Security professionals.

Unfortunately, a lack of basic knowledge in cyber technologies and a shortage of proper training accessible creates an obstacle for many to start a career in the Cyber Security field.

‘Cyber Essentials’ is an intensive practical program that provides everything needed to kickstart a career in the cyber sector. The course is also suitable for trainees looking to continue their academic pursuits or gain professional certifications within the cyber and IT world.

Skills gained

  • Managing Microsoft based network
  • Basic Networking
  • Basic Linux administration
  • Familiarity with Firewalls management
  • Understanding the common attack vectors

Suitable for:

  • Trainees motivated to pursue a career in the sector

SOC ANALYST

SOC (Security Operations Center) Analyst programme offers practical and theoretical cyber incident analysis and response knowledge.

More and more organisations are implementing managed security services internally and using MSSPs. Properly trained SOC Analysts give businesses solid cyber defense, fix damages and save costs. SOC Analysts are a critical part of damage mitigation activities, working on the front line of responding to cyber-attacks and incidents. SOC Analysts know how to react efficiently and effectively to security threats and incidents.

Trainees of this program will gain the practical knowledge required for their career in CS while learning the art and science of cybersecurity operations, from the vocabulary and effectiveness of incident handling to the severity of incidents and prioritization.

Skills gained

  • MS-Domain Technologies
  • Linux Environment and bash
  • Python scripting and automation
  • Digital Forensics and Incident Response
  • Malware Analysis

Suitable for

  • IT professionals
  • Junior level SOC analysts

WHY OUR PROGRAMME?

100% Online

Learning without borders

Small Class Size

Max 25 people per class

Industry Expert

leading providers of educational technologies and cyber training solutions

Expected Date: From March 2024​
CYWARIA

Next-generation Cyber Range

CyTechPRO

Learning Management Software

Cyflix

Content Streaming Platform

Cywareness

Cyber Awareness Platform

PROGRAMME 1: Cyber Essentials

Cyber Essentials is a comprehensive program that explains core cyber technologies.

The recent media interest in cyber-attacks has raised the cyber sector’s profile. With significant investment from big businesses and high salaries offered, many professionals are looking into the cyber domain for a career path shift. The industry is expanding exponentially, creating the hottest demand for qualified Cyber Security professionals.

Unfortunately, a lack of basic knowledge in cyber technologies and a shortage of proper training accessible creates an obstacle for many to start a career in the Cyber Security field.

‘Cyber Essentials’ is an intensive practical program that provides everything needed to kickstart a career in the cyber sector. The course is also suitable for trainees looking to continue their academic pursuits or gain professional certifications within the cyber and IT world.

Duration:

  • ~620 academic hours including HW and self-study (490 instructor hours)
  • 2-3 days a week, 3-4 academic hours per day

Suitable for:

  • Trainees motivated to pursue a career in the sector

Entry Requirement:

  • User-level knowledge of computers and the Internet
  • Strong analytical skills (logical reasoning, problem solving)
  • Full professional working proficiency in English
  • Willingness to further study/practice outside the classroom
  • Prior experience of programming and managing Microsoft and/or communication networks is highly advantageous

Skills Gained

  • Managing Microsoft based network
  • Basic Networking
  • Basic Linux administration
  • Familiarity with Firewalls management

PROGRAMME SYLLABUS

Introduction to Cybersecurity*

  • Course introduction
  • Core concepts
  • The cyber kill chain
  • Threat Landscape, threat scenarios and attack vectors

Networking Fundamentals*

  • Networking devices
  • LAN/WAN network topologies
  • The OSI reference model, TCP/IP
  • Physical layer and ethernet
  • ARP and ICMP
  • IP addressing> IPv4, VLSM, IPv6
  • TCP three-way handshake and UDP
  • Application layer: HTPP, SSH, DNS
  • IP routing
  • DCP and NAT
  • Network monitoring with Wireshark

Operating Systems: Windows*

  • Introduction to Windows
  • Introduction to Windows domains and Azure cloud
  • Building a Windows client machine and cloud computing
  • Cloud services, resources, and solutions
  • Managing processes and services
  • Windows and cloud networking and security
  • Microsoft Active Directory
  • Group policies
  • Windows services (RDP, DNS, DHCP, file and printer sharing)

Operating Systems: Linux*

  • Introduction to Linux and Linux distributions
  • Building a Linux virtual machine
  • The Linux file system
  • Text processing and regular expressions
  • Access control and file
    permissions
  • Searching for specific files
  • Linux networking
  • Managing processes
  • Installing programs and services
    (webserver, mysql, ssh, dhcp)
  • Bash scripting

Python Fundamentals*

  • Exploring programming languages
  • The code editor
  • Introduction to Python Expressions, variables, data and types
  • Loops and conditionals
  • Functions and modules
  • String handling and regular expressions
  • Array and dictionaries
  • Network programming with Scapy
  • Project: cryptography
  • Project: network scanner and banner grabbing
  • Project: scrapping a three-way handshake with Scapy

Cyber offensive: Ethical Hacking

  • OSINT, WHOIS, and DNS enumerations
  • Discovering live hosts
  • Network, port scanning and OS fingerprinting
  • Vulnerability analysis
  • Network control
  • The Metasploit database
  • Brute force attack
  • Privilege escalation: Windows
  • Privilege escalation: Linux
  • Lateral movement

Cyber offensive: Web Hacking

  • HTTP and the web attack
  • OWASP top 10
  • SQL injection
  • Client-side injection (XSS, CSRF)
  • OS Command Injections
  • Denial of Services
  • Local File Execution and Remote
  • File Inclusion
  • Working with Burp Suite

Cyber defence: Breach Prevention

  • Vulnerability management
  • Risk management
  • Security controls
  • Network segmentation
  • Network monitoring and malware
    detection
  • Security Incident and Event Management (SIEM)
  • Security Operations Center
  • Introduction to Checkpoint
  • Monitoring traffic connections

Cyber defence: Forensics

  • Network forensic and packet analysis
  • Extracting files
  • Memory forensics with Volatility
  • Disk and filesystem analysis
  • Creating timelines
  • Malware analysis
  • Windows memory forensics
  • Linux memory forensics

PROGRAMME 2: SOC Analyst

SOC Analyst program offers practical and theoretical cyber incident analysis and response knowledge.

More and more organizations are implementing managed security services internally and using MSSPs. Properly trained SOC Analysts give businesses solid cyber defense, fix damages and save costs. SOC Analysts are a critical part of damage mitigation activities, working on the front line of responding to cyber-attacks and incidents. SOC Analysts know how to react efficiently and effectively to security threats and incidents.

Duration:

  • ~620 academic hours including HW and self-study (490 instructor hours)

Suitable for:

  • IT professionals
  • Junior level SOC analysts

Entry Requirement:

  • User-level computer knowledge
  • Advanced English
  • Prior knowledge of data communication, operation systems,
  • internet technology, and programing is highly advantageous

Skills Gained

  • Networking technologies and TCP/IP protocols
  • MS-Domain Technologies
  • Linux Environment and bash
  • Python scripting and automation
  • Digital Forensics and Incident Response
  • Malware Analysis

PROGRAMME SYLLABUS

1. Introduction
  • Course Introduction
  • Information Security Life Cycle
  • Importance of SOC & Idea of Confidentiality, Integrity, Availability
2. Virtualization
  • Virtualization technologies
  • Installing VirtualBox
  • LAB Creation & Configuration
3. Networking
  • Introduction to networks OSI and TCP/IP models
  • Introduction to Packet Tracker
  • Physical and data link layers
  • Frame switching and switches
  • Networking layer
  • Ethernet
  • What is IP? IPv4 and IPv6
  • Unicast and broadcast
  • ARP protocol
  • Private and public addresses
  • Basic subnetting
  • Transport Layer
  • Access Control
  • TCP / UDP /DHCP /DNS
  • HTTP/HTTPS
  • FTP
  • Configuring service in packet traces
  • Static routing
  • Single-area OSPF
  • NAT
  • Wireshark
  • Traffic visualization
  • LAB: Packet Tracker
  • LAB: Wireshark

4. Windows

  • Windows OS
  • Basic Windows utilities
  • Windows users and groups management
  • File formats and extensions
  • Native windows processes
  • What is a server
  • Windows server roles
  • Role services and features
  • Active directory centralized unit
  • Installing Windows server features
  • Adding a client to a domain
  • AD objects management
  • Working with users and groups
  • Organization units vs security groups
  • Applying group policy
  • AD group policy vs local security policy
  • Computer vs user policies
  • Administrative templates
  • GPO templates

 

5. Windows Scripting

  • Overview & History
  • PowerShell vs CMD
  • Administrative Privileges
  • What is PowerShell
  • PowerShell Cmdlets / PowerShell Snapins / PowerShell Modules/ PowerShell Remoting
  • Navigating in PowerShell
  • Pipeline, Scripts and Syntax
  • Variables and Data Types
  • PowerShell Security
  • Script Execution
  • Remote Management
  • Script Flow Control
  • Statements
  • Administrative Uses

 

6. Windows Attacks

  • Pass the Hash
  • Pass the Ticket
  • Password Spraying
  • Golden Ticket
  • DCShadow

 

7. Linux

    • Linux distributions
    • Importing the VM
    • Introduction to the shell
    • Globing
    • Remoting (SSH Client)
    • Terminal Multiplexers (Terminator)
    • STDIO (STDIN, STDOUT, STDERR)
    • Output redirection and special files (/dev/null, …)
    • Chaining commands
    • Working with a pipe
    • Text processing with grep
    • Processing text with delimiters
    • Regular Expressions
    • Searching the File System
    • Find binaries and documentation (which, whereis)
    • Linux networking ip, ss, static IP configuration
    • Package management apt, yum
    • Users and groups
    • Sudo
    • Hash algorithms
    • SSH protocol explained / SSH keys vs password

8. Cloud Environment

  • Cloud Computing
  • Cloud Models (Public/Private/Hybrid)
  • Types of Cloud (IaaS/PaaS/SaaS)
  • Introduction to Azure
  • Azure Services
  • Virtual Machines
  • Account & Subscription
  • Azure Services
  • Azure Portal
  • Azure PowerShell
  • CLI & Cloud Shell
  • Office365
  • Azure Compute
  • Containers
  • Logic Apps

9. Security Operation Center (SOC)

  • SOC Services / SOC Types /SOC Rules / SOC Playbooks
  • IP Investigation / Public Tools
  • MITRE Attack – Tactics & Techniques
  • Sandbox Solution
  • LAB: IP Investigation & Report Creation
  • How to Response to a Cyber Attack (NIST 800-61)
  • Incident Response Plan
  • Responsibilities & Processes
  • Tabletop Exercise – Ransomware Infection
  • LAB: Creating Incident Response Plan
  • Denial of Service
  • Phishing Investigation
  • Malware & Ransomware & RAT
  • LAB: Simulation of RAT
    Investigation

10. Malware Analysis

  • What is Log?
  • Log Types
  • OS Logs / Application Logs / Audit Logs
  • Log Collection & Investigation
  • Lab: Apache Logs Investigation &
  • Attack Identification
  • What is the different between
  • Dynamic & Static Analysis
  • PeStudio / Red Line
  • Analyze file with IDA
  • Sysinternals – Process Explorer / Process Monitor / TCPView
  • Lab: Sysinternals Investigation
  • Lab: PML File Investigation –
    Ransomware

 

11. Endpoint Security

  • What is Event Viewer?
  • Registry
  • Task Scheduler & Persistence
  • LAB: Attack Detection with Event Viewer
  • Lab: Registry Changes Identification
  • LAB: Task Scheduler Creation
  • What is EDR? XDR, EDR, MDR –
  • What are the differences EDR Installation and Configuration
  • Detection & Prevention Modes
  • File Integrity Monitoring
  • Vulnerabilities Management & Detection
  • LAB: Rule Creation & Suspicious Behavior Detection

 

12. SIEM

  • What is SIEM?
  • SIEM Types
  • Data Collection: Syslog, CEF, API
  • Wazuh Installation
  • Wazuh Architecture – Elasticsearch, Logstash & Kibana
  • Wazuh Configuration
  • LAB: Log Collection – Event Viewer & Defender
  • Kibana Query Language
  • Rule Definition & Log Level
  • Rule Creation
  • Dashboard & Visualization
  • Mitre Attack Dashboard
  • LAB: Dashboard Creation

 

13. Proactive Technologies

  • What is WAF?
  •  Mod Security
  • What is Data Loss Prevention
  • Data Leakage Channels
  • Data Classification
  • LAB: Investigation an infected endpoint that sent data outside

14. Forensics

  • What is digital forensics? What is evidence? Evidence life cycle
  • Files and File Systems
  • Digital Forensics and Common
    Artifact
  • Malware Analysts – Static and Dynamic Persistence (WMI/Startup/Schedule
    task/Registry)
  • MITRE Attack – Tactics & Techniques
  • LOLBINS
  • Memory forensics with Volatility
  • Disk and filesystem analysis
  • Network forensics and packet analysis
  • Creating a forensic report
  • Forensic hardware
  • Hardware writes/blockers
  • Processing the scene
  • Forensic Software
  • File Signature Analysis
  • Email Analysis

15. Python Programming

  • Programming concepts
  • How code works
  • The integrated development environment
  • Basic Data Types / Advanced Data Types Practice and revision
  • Control flow
  • Loops
  • Modules and imports
  • Functions
  • Object Oriented Programming
  • Functional Programming and Lambda’s

CYBERPRO GLOBAL

ABOUT CYBERPRO GLOBAL

CYBERPRO Global (CPG) is a prominent provider of educational technologies and cybersecurity training solutions with headquarters in Madrid and Zurich, and regional offices in Singapore, Melbourne, and Bogota. Operating across four continents, CPG has extensive experience in both public and private sectors, offering cybersecurity solutions to government bodies and national-level organizations. In response to the escalating threat of cyberattacks, CPG addresses the global shortage of cyber experts through tailored training programs and cutting-edge facilities, utiliSing expertise and technological assets to fortify individuals and organiSations against real-world cybersecurity challenges.

CYWARIA
Next-generation Cyber Range

A cloud-based cyberwar gamification simulation platform replicating real-world threats to train cyber professionals. Its robust, competitive cyber wargame environment and interactive learning experience keep trainees engaged in learning new skills and developing their knowledge to become cybersecurity experts.

Cywareness
Cyber Awareness Platform

An advanced, autonomous Cyber Awareness simulator, designed by real hackers to train students and expose them to real-world threats. Our autonomous simulator measures the current human risk by attacking them in a series of cyberattacks, varying in complexity.

CyTechPRO
Learning Management Software

A comprehensive learning management system offering students a centralized platform for materials, labs, assignments, quizzes, and training, along with social features like forums and chat rooms. The system includes recorded lessons and videos, providing easy access to educational content. Live updates keep students informed about events and assignments, while performance tracking allows monitoring of student progress.

Cyflix
Content Streaming Platform

Cyflix addresses obstacles hindering trainees from completing their learning journey by providing an immersive online cybersecurity training experience. CYBERPRO’s platform offers premium cybersecurity content through a comprehensive video streaming service, featuring exclusive and top-notch materials on the latest cybercrime trends. Making cybersecurity awareness training enjoyable and engaging, Cyflix becomes the preferred platform with its easily accessible micro-training units, ensuring students can conveniently learn anytime and anywhere.

CONTACT US

Ms Nur Amyra Binti AHMAD KHAIR
RUCPD Assistant Manager

ENQUIRY NOW