Cyber Security

Provided by

Enquire about this course

About the course

As an introductory offer, we are offering a 50% discount for the first 12 people at a cost of only £1,247.50 inc VAT. Prices after the 18th November will be £2495 inc VAT.

 

Course Format

The course will start with an initial recap of knowledge the candidates are expected to already have but in order to contextualise elements of that knowledge. It will include a good balance of predominantly practical activity but with sufficient theory and legal elements to ensure that the correct methodology for a penetration test is undertaken each time. To maintain flexibility, the course is broken down into modules that can be moved around and retain a margin of time flexibility to take into account the potential for mixed abilities in the classroom.  

Assessment

The candidate is assessed throughout the course through interactive activities and verbal feedback. Any areas for further development are discussed with the candidates at the earliest opportunity. On the assessment module, candidates will complete a practical scenario followed by the requirement to write a written report of findings. This will be scored and discussed with the candidate so that they are aware of their areas for further development. This is not intended to be a pass / fail course.

Course Contents
 
Penetration Testing Methodology • The purpose of a penetration test • Scoping the test • Authority to test (customer, suppliers) • Compliance requirements (if any)
 
Legal framework • Relevant legislation (these will be amended accordingly post Brexit) o Computer Misuse Act 1990 o Communications Act 2003 o General Data Protection Regulation 2016 o Official Secrets Act 1989
 
Networking and enumeration fundamentals • Network architecture types • Common protocols and services • Network fingerprinting • Identification and exploitation of services
 
Exploitation • Common vulnerabilities • Bug bounties • CVE • Responsible disclosure
 
Cryptography • Common cryptography methods • Deprecated but often used cryptography methods
 
Wireless • Wireless networking protocols • Packet sniffing • Packet injection • Key cracking
 
Social Engineering • Common social engineering / fraud attack vectors • Reconnaissance • Execution • Education / Awareness
 
Website applications • Common scripting languages • OWASP Top 10 • APIs • Assessment tools
 
Mobile applications • Android, iOS environments • Common vulnerabilities • Security assessment basics
 
Reporting of findings • Structuring a penetration test report • Articulating technical findings in non-technical language • Proposed remediation • Scoring of risk against the CIA model
 
Continued Professional Development (CPD) • Low to no cost options • Recommended reading • Premium options

Enquire

Start date Location / delivery
No fixed date Crewe

Related article

Cyber security training is falling short, one expert has warned. A global expert in cyber security has warned that the dearth of talent in the indu...