This module will introduce some of the core themes of cyber security. They are followed by two software simulations, showing how to install a hypervisor so that a Kali Linux virtual machine can be run. Kali Linux is a Linux operating system used by penetration testers.
- Cyber Security
- Prevent, Detect, Respond
- The CIA Triad
- ISMS: Information Security Management Systems
- Threat Actors
- The Cyber-Kill Chain
- Attack Surfaces
- Installing Virtualbox
- Installing Kali Linux
Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
We welcome all feedback and suggestions - please contact us at email@example.com to let us know what you think.
Hello and welcome to your introduction to the world of cybersecurity, on the Cyber Primer course. Preventing, detecting and responding are the three core remits of cybersecurity. Being able to comprehensively do each of these will put you in the best stance to resist a breach of your assets, and minimize any disruption to your organization. Something will inevitably happen but being prepared to respond will put you in the best place possible. In this course, we'll look at what preventing, detecting and responding means in a very practical sense. You will experience a cyber attack from the perspective of the adversary. The best person to ask how to secure a house is a burglar. And the aim is to provide you with some of the skills that would be used to target you, your organization, and the information you have access to. At the end of this course, you will be able to list the core factors when evaluating cyber risk. List the main categories of a cyber threat actor, their motivations and methods to achieve their aims. Understand and apply the Cyber Kill Chain in order to understand and mitigate cyber risk. Practice some of the same recon techniques that threat actors carry out while preparing for an attack, and look at methods to mitigate this threat. Practice some of the same weaponization techniques that threat actors employ when they are preparing their exploits against Windows, Linux and Android devices. Understand reverse encoding and encryption techniques that are used to hide the true purpose of malware. And experience social engineering from the first person perspective. This course will be a bit of theory and practice. You'll cover the theory in these videos, then see how it is done in some of the simulations, and we'll show you how you can do it yourself. You'll need to be able to run some virtualization software, so make sure you have an up to spec computer. We'll provide a list of the hardware requirements and show you how to install and run any software that you need.
Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.