New Cyber Training For Security Professionals

Promotion
 
 
In light of the almost complete lockdown in the US and Europe, CYRIN has launched its first full length cyber security course. This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.
 
This is an introductory course in cyber security and is the first of 3 full courses that will be provided through CYRIN this year.  Each course can be paused at any time where the student can come back and continue where he/she left off. At the end of each course, there is a multiple-choice test.  
 
This first course, Cyber Security Skills Foundation (CSSF) is taught by Kevin Cardwell, a friend of CYRIN and an internationally acclaimed cyber security trainer.
 
CYRIN is designed as an e-learning product to be used without an instructor. It can also work as a classroom (physical or virtual) tool to be used with an instructor. 
 
As a classroom tool, CYRIN incorporates a robust performance management capability and also the capability for the instructor and administrator to develop her or his exercises.
 
These courses using slides, video and a number of CYRIN labs, exercises and/or cyber-attack scenarios Cyber Security Skills Foundation (CSSF) has eight modules where six CYRIN labs and 14 “micro labs” have been integrated and developed specifically for the course.
 
To gain the skills needed to move on to more advanced security topics. The majority of professionals entering the field will lack the foundation that this course will bring and so it is important to complete the training. 
 
1. Learn how to execute a set of techniques that are critical to the     protection of your entire network
2. Learn the foundation components of the network
3. Explore the concepts of attacks at the packet level
4. Establish solid skills in Unix/Linux
5. Develop virtualisation knowledge
6. Gain an understand the hacking methodology
 
By taking this course you will learn the foundations of security, including in-depth knowledge of the TCP/IP network protocol.
 
• You will learn how to analyse packets for irregularities
• You will learn how to detect signs of crafted packets
• You will learn advanced protocol analysis techniques
• You will perform low-level protocol analysis
• You will learn functional skills in Unix and Linux
• You will learn the fundamentals of vulnerability assessment and the hacking methodology
 
Training Time
 
40 hours and this is self-paced. You can pause and continue at any time. 
40 CPEs awarded on successful completion. 
 
The name of this first course is Cyber Security Skills Foundation (CSSF)
 
Check it out for free HERE   
________________________________________________________________
 
 
« A New Generation Of Critical Vulnerabilities
Britain’s £9bn Cyber Security Sector »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

CyberArmor

CyberArmor

Cyber Armor defend everyday IT and OT systems, from government agencies to critical infrastructure, from system integrators to small industries.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.

Securitum

Securitum

Securitum is a leading penetration testing company in central and eastern Europe.