close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Cyber Security Training

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Certified Cyber Security Professional Course Outline

This course follows the following course structure:

Cyber Threats Affecting Business

This module focusses on the potential threats that a business can face. Our trainers will begin by explaining one of the greatest cyber security threats facing businesses today: Hacking. Delegates will study the motives behind hacking and the tools hackers use. Phishing will also be defined and described. Training will then move on to discuss other areas of cyber security, touching upon threats associated with social media, the web, and mobile devices. This module aims to supply delegates with an overarching understanding of the threats affecting businesses in today's technological world.

  • Hacking
  • Phishing
  • Web Security
  • Social Media
  • Mobile Devices
  • Spyware, Malware & Ransomware
  • Physical Security

Actions for Combatting Cyber Threats

The second module of this Certified Cyber Security Professional training course will primarily help delegates to understand the steps that they can take to prevent cyber-attacks within their enterprise. Training begins with a basic explanation of the importance of password protection, before moving on to more technical methods of mitigation such as encryption and 2-Factor Authentication. Physical Security, often overlooked as an efficient cybersecurity prevention mechanism is also covered. Thus, upon completion, candidates will be well-informed and understand the methods of combatting cyber security threats and preventing malicious attacks. 

  • Passwords
  • Encryption Techniques
  • Secure Mobile Devices
  • Removable Media
  • 2-Factor Authentication
  • Physical Security
  • Browsing
  • Sensitive Data

Show moredown

Who should attend this Cyber Security Training Course?

Individuals with an interest in improving their understanding of cyber security should attend this CCS-PRO course.

Prerequisites

This course has no prerequisites, but it may help candidates if they have some background knowledge of cybersecurity.

Certified Cyber Security Professional Course Overview

Cyber Security is becoming increasingly prevalent, with a larger number of businesses becoming affected by cyber-attacks each year. This Certified Cyber Security Professional (CCS-PRO) training course will teach you how to avoid and protect against cyber security threats. Cyber Security is a crucial aspect of a business, and it must be made certain that the correct procedures are enacted to guarantee the best security for the enterprise. During one day of training, delegates will gain an understanding of the importance of cyber security and the cyber security practices that can be implemented within the business environment.

Our CCS-PRO training course provides delegates with up-to-date knowledge of the cybersecurity threats that organisations face today, and the best day-to-day actions to follow to mitigate risks. Our trainers are extremely experienced in this field and are dedicated to ensuring our delegates pass the CCS-PRO exam and leave with the best understanding of Cyber Security. With this impressive qualification, professionals can enhance their value within their company and use their knowledge to improve cybersecurity within their enterprise. 

Show moredown

Certified Cyber Security Professional Exam Information

  • 40 questions
  • 60 minutes
  • 65% pass mark
  • Closed book
  • Multiple choice

What's included in this Cyber Security Training Course?

The Certified Cyber Security Professional course includes:

  • The Examination
  • The Knowledge Academy Certified Cyber Security Professional Manual
  • Certificate
  • Experienced Instructor
  • Refreshments

Show moredown

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Cyber Security Awareness Course Outline

The course covers the following topics:

Understanding Cyber Threats

  • Hacking
  • Social Engineering
  • Email Phishing
  • Mobile Devices
  • Spyware, Ransomware and Malware
  • Social Media
  • Web Security
  • Physical Security

Preventing Cyber Threats

  • Secure Passwords
  • Two-Factor Authentication
  • Securing Mobile Devices
  • Browsing Securely
  • Limiting Removable Media
  • Encryption
  • Destroying Sensitive Data
  • Physical Security Measures
  • Preventing Phishing

Show moredown

Who should attend this Cyber Security Training Course?

The course is designed for anybody who uses information technology as part of their job.

Prerequisites

There are no prerequisites to attend.

Cyber Security Awareness Course Overview

With more businesses being the victims of cyber-attacks each year, it is vitally important that organisations can secure themselves. This means all staff need to be aware of risks and how to mitigate them.

Our Cyber Security Awareness course provides critical training in cyber security threats and how to avoid them. Designed for any employee at any organisational level, the training provides easy to follow best practice procedures for all staff to follow to reduce risk and keep themselves and the company secure. During the 1-day course, delegates will learn all about the cyber security threats they face, how to identify them and how they can help prevent them through simple day to day security procedures.

Show moredown

What’s Included in this Cyber Security Training Course?

You will be provided with:

  • The Knowledge Academy’s Cyber Security Awareness Delegate Pack
  • Experienced Instructor
  • Completion Certificate
  • Refreshments

Show moredown

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Cyber Security Risk Management Course Outline

The course covers the following topics:

Introduction to Cyber Risk

  • What is cyber security risk?
  • Types of risk
  • The threat landscape
  • The impact of cyber threats

Dealing with Risk

  • Identifying risk
  • Evaluating risk
  • Mitigating threats

Risk Management

  • Risk management as part of a wider cyber security management approach
  • Meeting cyber security standards
  • Risk management strategy
  • Following best practice

By the end of the course, you will:

  • Understand how today’s cyber-attacks are executed
  • Recognise the key categories of cyber-attack
  • Discover key strategies that can prevent or mitigate cyber-security risks
  • Gain skills in the detection and investigation of cybercrime
  • Assess & assure the cyber-security posture of your organisation

Show moredown

Who should attend this Cyber Security Training Course?

The course is designed for cyber security practitioners who are involved in planning and executing risk management strategy. It is also suitable for general risk managers who would like improve their knowledge of cyber risk.

Prerequisites

There are no prerequisites to attend.

Cyber Security Risk Management Course Overview

This 1-day course provides a comprehensive introduction to the assessment and management of cyber security. Equipping cyber security practitioners and managers with an understanding of what should be in a risk management strategy, the course provides foundation-level knowledge of information security management best practice to help organisations defend themselves from threats.

 

Show moredown

What’s Included in this Cyber Security Training Course?

In this Cyber Security Risk Management course, delegates will be provided with:

  • The Knowledge Academy’s Cyber Security Risk Management Delegate Pack
  • Experienced Instructor
  • Completion Certificate
  • Refreshments
 

Show moredown

Online Instructor-led (2 days)

Online Self-paced (16 hours)

Computer Forensics Foundation Training Outline

This course covers the following topics:​

  • Aims, Processes, and Phases of a Forensics Investigation
  • Identification and Seizure
  • Forensic Acquisition
  • Physical and Logical Disks
  • File Systems and Data Storage
  • Forensic Analysis Techniques
  • Forensic Challenges and Reporting

Show moredown

Who should attend this Computer Forensics Training Course?

The course is designed for anybody working in a security role who is in charge of protecting their organisation’s data.

Prerequisites

There are no prerequisites, but some understanding of information security will be an advantage.

Computer Forensics Foundation Training Overview

This Computer Forensics Foundation training course provides you with a comprehensive introduction to the topic for anyone preparing to develop their knowledge in this field. You will learn about Forensic Investigations, the seizure and capture of data storage devices, as well as any analysis techniques used by professionals.

Show moredown

What's included in this Computer Forensics Training Course?

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

Show moredown

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Introduction to System and Network Security Course Outline

 

Module 1: Building a Secure Organisation

  • Real Threats that Impact Cyber Security
  • Hackers Inside and Out
  • Eavesdropping
  • Spoofing
  • Sniffing
  • Trojan Horse
  • Viruses
  • Wiretaps

Module 2: A Cyber Security Policy and Cryptography Primer

  • Assurance Objectives
  • Caesar Cipher
  • Cryptography
  • Symmetric Encryption
  • Data Encryption Standard (DES)
  • Advance Encryption Method (AES)

Module 3: Solving Key Distribution Issues with Asymmetric Encryption

  • Key Management
  • What is OpenPGP/GnuPG?

Module 4: Ensuring Integrity with Hashes

  • Secure Hashing Algorithm
  • Data Integrity
  • Difference Between WEP, WPA, and WPA2
  • Data Integrity
  • Digital Signatures

Module 5: Assessing Traditional Static Password Schemes

  • Preventing Password Cracking
  • Social Engineering Attacks

Module 6: Evaluating Strong Authentication Methods and Authenticating Hosts

  • Preventing Password Replay
  • Multi-Factor Authentication
  • Authenticating
  • What is a Spoofing Attack?
  • IP Address Spoofing Attacks
  • ARP Spoofing Attacks
  • Spoofing Attack Prevention and Mitigation

Module 7: Preventing System Intrusions and Discovering System Vulnerabilities

  • Intrusion Detection Systems (IDSes)
  • Type Of IDS Monitoring
  • Sources of Vulnerabilities
  • Vulnerability Assessment
  • Identification of Vulnerabilities

Module 8: Encrypting Files for Confidentiality

  • Encrypting File System
  • Important Basic Facts About EFS

Module 9: Hardening the Operating System

  • Steps to Use to Secure an Operating System
  • Initial Setup and Patching
  • Remove Unnecessary Services, Applications, and Protocols
  • Configure Users, Groups, and Authentication
  • Configure Resource Controls
  • Install Additional Security Controls
  • Test the System Security

Module 10: Scanning for Vulnerabilities and Reducing DoS Attacks

  • Overview
  • Benefits of Vulnerability Scanner
  • Types of Vulnerability Scanner
  • Nessus Vulnerability Scanner
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)

Module 11: Deploying Firewalls to Control Network Traffic

  • Firewalls to Control Network Traffic
  • Firewalls Design Principles
  • Types of Firewalls
  • Packet-Filtering Router
  • Application-Level Gateway
  • Circuit-Level Gateway

Module 12: Protecting Web Services and Applications

  • Overview
  • Blue Coat WAF Capabilities

Module 13: Threats from the LAN and Confidentiality on External Connections

  • Sniffing the Network
  • Mitigating Threats from Connected Hosts
  • Partitioning the Network to Prevent Data Leakage
  • Identifying Wireless LAN Vulnerabilities
  • Confidentiality with Encryption
  • Securing Communication with IPSec

Show moredown

Prerequisites

There are no formal prerequisites in this Introduction to System and Network Security training course.

Audience

This Introduction to System and Network Security course is designed for anyone who wants to gain in-depth knowledge about the system and network security and gain the skills to secure networks.

Introduction to System and Network Security Course Overview

Network Security safeguards data and networks from intrusions, breaches, and other dangers. It is crucial to guard client information, keep shared data secure, provide reliable network performance and access, and protect from cyber threats. A well-developed network security solution decreases expenses and protects organisations from price losses from data violations or other security incidents. Skills gained from this System and Network Security training course will help learners to achieve higher job posts such as Cyber Security Engineer, IT Security Analyst, Cyber Security Analyst, Cyber Security Consultant, Network Security Engineer, and many more. Adding Network Security as a skill in learners' profiles will surely help them climb the ladder of success in value and career opportunities.

Our 1-day Introduction to System and Network Security Training course aims to provide delegates with a comprehensive knowledge of system and network security. During this course, delegates will learn about preventing system intrusions and discovering system vulnerabilities. They will also learn about various essential topics such as eavesdropping, Trojan horse, Caesar cypher, data encryption standard, data integrity, social engineering attacks, IP address spoofing attacks, vulnerability assessment, packet-filtering router, sniffing the network, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and will help you get a complete understanding of this course.

This training will also cover the following concepts:

  • Hackers inside and out
  • Symmetric encryption
  • Preventing password cracking
  • Multi-factor authentication
  • Configure users, groups, and authentication
  • Bluecoat WAF capabilities
  • Identifying wireless LAN vulnerabilities

At the end of this Introduction to System and Network Security Training course, delegates will be able to deploy firewalls to control network traffic. They will be able to scan for vulnerabilities and reduce DoS attacks. They will also be able to remove unnecessary services, applications, and protocols.

If delegates want to pursue their career in the security sector, they can choose our other popular training courses such as Certified Cyber Security Professional (CCS-PRO), Cyber Security Awareness, Cyber Security Risk Management, and many other courses.

Show moredown

  • The Knowledge Academy’s Introduction to System and Network Security Manual
  • Experienced Instructor
  • Completion Certificate

 

Show moredown

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Social Engineering Training Course Outline

Introduction to Social Engineering

Social Engineering Types

  • Email
  • Telephone
  • Baiting
  • Fax
  • Pretexting

Influencing Techniques

Overview of Elicitation

  • Flattery
  • False Statements
  • Artificial Ignorance
  • Sounding Board
  • Bracketing
  • Confidential Baiting

Basics of Pretexting

  • Research and Planning
  • Legal Considerations
  • Body Language

Information Gathering Basics

  • Information Organisation Overview
  • Dradis Framework
  • Sources of Information

Computer-Based and Physical Tools

  • Kali Linux
  • Social Engineering Toolkit (SET)
  • Metasploit Framework
  • Maltego
  • Cameras and GPS
  • Telephone and Lock Picking

Show moredown

Who should attend?

Anyone who wishes to enhance their knowledge of social engineering can attend this course. Professionals who wish to learn how to secure systems from social engineering attacks can also attend this course.

 

Prerequisites

There are no formal prerequisites for this course.

Social Engineering Training Course Overview

Social engineering refers to the art of manipulating people to gain access to confidential data for fraudulent purposes. It is a term used for a wide range of malicious activities accomplished through human interactions.

Because social engineering relies on human error rather than vulnerabilities in software and operating systems, it requires a different approach to traditional network security.

This Social Engineering course is designed to provide knowledge to defend against social engineering tricks. During this training, delegates will learn about various influencing techniques including reciprocity, scarcity, and likability.

They will also become familiarised with common elicitation techniques, as well as pretexting. By the end of the course, you will understand the various computer-based and physical tools of social engineering, including the Social Engineering Toolkit (SET).

Show moredown

What’s Included

  • The Knowledge Academy’s Social Engineering Training Manual
  • Experienced Instructor
  • Completion Certificate

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 646-687-6780 or Inquire.

What our customers are saying

Frequently asked questions

FAQ's

Please arrive at the venue at 8:45am.
The Knowledge Academy is the Leading global training provider in the world for Cyber Security Training.
The price for Cyber Security Training certification in the United States starts from $.

Why we're the go to training provider for you

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Cyber Security Training