The objective of the Making Sense of Cyber course is to provide a comprehensive but necessarily high level overview across industry standard technology and platforms, illuminating the technology and its specific cyber challenges without technically challenging the learner to hands-on labs.
The course takes the learner back to computer basics to build the individuals understanding common technology platforms through to the network layer and on via virtualisation technologies, cloud systems, telecoms and modern communications. Closing the second day with a module focused on the benefits and pitfalls of encryption. Day three, introduces the global business of cybercrime and its various lucrative forms. A module focused on the common methods of attack provides the learner with an insight into many of the most popular attack vectors today, including attacks against industrial control systems. Followed by a session underpinned by open source intelligence and the tools and technologies of the dark web.
Each day provides insight into the technical subject matter with the crucial security subtext, enabling the learning to ask the right question, at the right time. Knowledge check ‘white board’ exercises, where delegates work in groups to discuss and provide solutions to scenarios offering an explanation with a rationale in each instance of why this is important from a security perspective. Plus homework questions based on the modules of the day, for delegates to take away complete and discuss model answers at the start of the next day.
During the delivery we will provide the delegates with access to recorded video demonstrations of the technical subject matter, case study materials within the applicable modules, which will enhance the learners experience whilst preserving any technical confidence as there are limited requirements for the learner to undertake ‘hands-on’ labs.
The three day course delivers individual modules as described below.
Introduction & Course Objectives
OSI Protocol Stack
Telecoms & Modern Communications
Virtualisation & Cloud Technologies
Common Methods of Attack
Industrial Control Systems Attacks
Digital Footprints & the Dark Web
here are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.