Boost logo
Language
course | Introduction to Cyber Security

We turn your development needs and aspirations into powerful digital solutions that drive growth

IT-1260 | Introduction to Cyber Security

Course Sector : Information Technology

Duration
Date from
Date to Course Venue Course fees Book a course
5 Days2025-06-232025-06-27Dubai$4,250 Book now
5 Days2025-08-112025-08-15London$4,950 Book now
5 Days2025-12-222025-12-26Dubai$4,250 Book now

Course Introduction

This training program is designed to develop participants’ abilities to design a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through different learning solutions and practical application activities, participants will learn about current threat trends across the Internet and their impact on organizational security. The training program will cover topics on standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience by mitigating controls.

 

Course objective

  •  Understand and apply different data protection strategies.
  •       Master Interpreting and analyzing tool output for network mapping/foot printing.
  •       Master reducing attack surface of systems and network devices.
  •       Understand how to examine the role of PKI/certificates in building trusted relationships between devices in a network.
  •       Master Implementing login security and other identity management solutions.
  •       Identify current malware threats, anti-malware solutions, social engineering threats, methods, and techniques.
  •       Master Analyzing software vulnerabilities and security solutions for reducing the risk of exploitation.
  •       Identify physical security controls and the relationship between physical and IT security.
  •       Understand legal considerations and investigative techniques when it comes to cybersecurity.

Course Outline | Day 01

Cybersecurity awareness

 

  •       What is security?
  •       Confidentiality, integrity, and availability
  •       Security baselining
  •       Security concerns: Humans
  •       Types of threats
  •       Security controls
  •       What is hacking?
  •       Risk management
  •       Data in motion vs. data at rest
  •       Module review

 

Network discovery

 

  •       Networking review
  •       Discovery, footprinting, and scanning
  •       Common vulnerabilities and exposures
  •       Security policies
  •       Vulnerabilities
  •       Module review

 

Systems hardening

 

  •       What is hardening?
  •       Types of systems that can be hardened
  •       Security baselines
  •       How to harden systems
  •       Hardening systems by role
  •       Mobile devices
  •       Hardening on the network
  •       Analysis tools
  •       Authentication, authorization, and accounting
  •       Physical security
  •       Module review

Course Outline | Day 02

Security architecture

 

  •       Security architecture
  •       Network devices
  •       Network zones
  •       Network segmentation
  •       Network Address Translation
  •       Network Access Control
  •       Module review

 

 

Data security

 

  •       Cryptography
  •       Principles of permissions
  •       Steganography
  •       Module review
  •       Public key infrastructure
  •       Public key infrastructure
  •       Certification authorities
  •       Enabling trust
  •       Certificates
  •       CA management
  •       Module review

 

 

Identity management

 

  •       What is identity management?
  •       Personally identifiable information
  •       Authentication factors
  •       Directory services
  •       Kerberos
  •       Windows NT LAN Manager
  •       Password policies
  •       Cracking passwords
  •       Password assessment tools
  •       Password managers
  •       Group accounts
  •       Service accounts
  •       Federated identities
  •       Identity as a Service
  •       Module review

Course Outline | Day 03

Network hardening

 

  •       Limiting remote admin access
  •       AAA: Administrative access
  •       Simple Network Management Protocol
  •       Network segmentation
  •       Limiting physical access
  •       Establishing secure access
  •       Network devices
  •       Fundamental device protection summary
  •       Traffic filtering best practices
  •       Module review

 

Malware

 

  •       What is malware?
  •       Infection methods
  •       Types of malware
  •       Backdoors
  •       Countermeasures
  •       Protection tools
  •       Module review

 

 

Social engineering

 

  •       What is social engineering?
  •       Social engineering targets
  •       Social engineering attacks
  •       Statistical data
  •       Information harvesting
  •       Preventing social engineering
  •       Cyber awareness: Policies and procedures
  •       Social media
  •       Module review

Course Outline | Day 04

Software security

 

  •       Software engineering
  •       Security guidelines
  •       Software vulnerabilities
  •       Module review

 

Environment monitoring

 

  •       Monitoring
  •       Monitoring vs. logging
  •       Monitoring/logging benefits
  •       Logging
  •       Metrics
  •       Module review

 

Physical security

 

  •       What is physical security?
  •       Defense in depth
  •       Types of physical security controls
  •       Device security
  •       Human security
  •       Security policies
  •       Equipment tracking
  •       Module review

Course Outline | Day 05

Incident response

 

  •       Disaster types
  •       Incident investigation tips
  •       Business continuity planning
  •       Disaster recovery plan
  •       Forensic incident response
  •       Module review
  •        Legal considerations
  •       Regulatory compliance
  •       Cybercrime
  •       Module review

 

Trends in cybersecurity

 

  •       Cybersecurity design constraints
  •       Cyber driving forces
  •       How connected are you?
  •       How reliant on connectivity are you?
  •       Identity management
  •       Cybersecurity standards
  •       Cybersecurity training
Course Certificates
BOOST Logo

BOOST’s Professional Attendance Certificate “BPAC”

BPAC is always given to the delegates after completing the training course,and depends on their attendance of the program at a rate of no less than 80%,besides their active participation and engagement during the program sessions.

Request a Quote
Follow us
facebook iconinstagram iconlinkedIn icontwitter icon
BOOST Logo

Since 2001, we have been pioneering the training field in the Middle East, helping individuals, teams, and organizations reach their full potential with integrated solutions.

left

🔗 Quick Links

Boost Abroad logoSparks logo

Sister Companies to Boost Consulting and Training

Training Image 1Training Image 2Training Image 3Training Image 4Training Image 5Training Image 6

We believe in progress for everyone.

We helped more than 10,000 clients over 20 countries on 4 continents in boosting their knowledge, skills, and careers.

Copy rights

Boost Training And Consulting All Copyrights Reserved 2025