OverviewStepsAuthor
QA
This content is developed in partnership with QA
DifficultyBeginner
AVG Duration2h
Students265
Ratings
5/5
starstarstarstarstar
Content
Course Created with Sketch. 5 Resources Created with Sketch. 1

Description

Learning Path Overview

The QA Cyber Primer program aims to introduce the learner to the world of Information and Cyber Security. The course takes the learner through the eyes of an adversary – someone trying to infiltrate a computer's security using some of the steps of the Cyber Kill Chain, and showcases some real-world examples of the chain in-action. The learner first sees the theory and examples of how certain methods of the kill chain work, and can then view them in-action in software simulations.  

The course starts by taking the learner through the basics of cyber security. This includes some of the terminology used, such as the different types of adversaries, and the 8 stages of the Cyber Kill Chain. There are two simulation videos that introduce the learner to some of the basic software used in Cyber Security.  

It then moves on to looking at reconnaissance: how a target is scoped. It looks at how popular software and websites can be used, and shows 3 simulation videos of reconnaissance tools.  

Then the program looks at the weaponization stage: how malware can be created to be utilized against a target. This is followed by simulations of some simple Mobile and Desktop malware creation.  

The final part looks at delivery of the payloads created in the previous module. This is then followed by the simulation of payload delivery. 

Please note: this content was produced in the UK and may include the use of British English.

Intended Audience

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.  

Prerequisites of the Certifications

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet. 

 

Learning Objectives

The Cyber Primer course covers the following areas:  

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems 
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Reconnaissance  
  • Social Engineering  
  • Weaponization 
  • Obfuscation 
  • Encryption   
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Obfuscation  
  • Payload Delivery Methods  
  • Exfiltration  

Feedback 

We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.  

Agenda

This Learning Path contains videos, software simulations, and other resources for four courses.  

Course Introduction

We begin with an introduction to the course and what you can expect from the videos in this Learning Path.  

Module 1 – Understanding Cyber Security

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems 
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Installing Virtualbox 
  • Installing Kali Linux 

Module 2 – Reconnaissance

  • Reconnaissance  
  • Social Engineering  
  • Twitter Profiling  
  • Google Hacking  
  • Maltego  

Module 3 – Weaponization

  • Weaponization 
  • Obfuscation 
  • Encryption   
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Windows App Malware Creation  
  • Mobile Malware Creation  

Module 4 – Payload Delivery 

  • Payload Delivery Methods  
  • Exfiltration  
  • Pivot Networks  

 

Certificate

Your certificate for this learning path
lock

Learning Path Steps

1courses

This course introduces the Cyber Primer learning path.

2courses

This course will introduce some of the core themes of cyber security, followed by two software simulations.

3courses

This module will introduce some techniques used for reconnaissance and social engineering. The software simulations introduce some of the methods and software that can be used in reconnaissance.

4courses

This module will look at weaponization, or how hacking exploits can be created and disguised. The software simulations will cover the creation of mobile and desktop payloads.

5description

The code used in Handlers for the How To: Mobile Malware, How To: Windows App Payload, and How To: Network Pivot software simulations.

6courses

This module will look at how payloads are delivered, and some of the methods that are used to exfiltrate information. The simulation covers an example of how a simple pivot network exploit works.

About the Author
Students523
Courses5
Learning paths1

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics