Cyber Primer

Developed with QA
OverviewStepsAuthor
QA
This content is developed in partnership with QA
DifficultyBeginner
Duration1h 38m
Students5

Description

Learning Path Overview

The QA Cyber Primer program aims to introduce the learner to the world of Information and Cyber Security. The course takes the learner through the eyes of an adversary – someone trying to infiltrate a computer's security using some of the steps of the Cyber Kill Chain, and showcases some real-world examples of the chain in-action. The learner first sees the theory and examples of how certain methods of the kill chain work, and can then view them in-action in software simulations.  

The course starts by taking the learner through the basics of cyber security. This includes some of the terminology used, such as the different types of adversaries, and the 8 stages of the Cyber Kill Chain. There are two simulation videos that introduce the learner to some of the basic software used in Cyber Security.  

It then moves in to looking at reconnaissance: how a target is scoped. It looks at how popular software and websites can be used, and shows 3 simulation videos of reconnaissance tools.  

Then the program looks at the weaponization stage: how malware can be created to be utilized against a target. This is followed by simulations of some simple Mobile and Desktop malware creation.  

The final part looks at delivery of the payloads created in the previous module. This is then followed by the simulation of payload delivery. 

Intended Audience

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.  

Prerequisites of the Certifications

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet. 

 

Learning Objectives

The Cyber Primer course covers the following areas:  

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems 
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Reconnaissance  
  • Social Engineering  
  • Weaponization 
  • Obfuscation 
  • Encryption   
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Obfuscation  
  • Payload Delivery Methods  
  • Exfiltration  

Feedback 

We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.  

Agenda

This Learning Path contains videos, software simulations, and other resources for four courses.  

Course Introduction

We begin with an introduction to the course and what you can expect from the videos in this Learning Path.  

Module 1 – Understanding Cyber Security

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems 
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Installing Virtualbox 
  • Installing Kali Linux 

Module 2 – Reconnaissance

  • Reconnaissance  
  • Social Engineering  
  • Twitter Profiling  
  • Google Hacking  
  • Maltego  

Module 3 – Weaponization

  • Weaponization 
  • Obfuscation 
  • Encryption   
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Windows App Malware Creation  
  • Mobile Malware Creation  

Module 4 – Payload Delivery 

  • Payload Delivery Methods  
  • Exfiltration  
  • Pivot Networks  

 

Certificate

Your certificate for this learning path
lock

About the Author

Students34
Courses5
Learning paths1

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics