New Cyber Training For Security Professionals

Promotion
 
 
In light of the almost complete lockdown in the US and Europe, CYRIN has launched its first full length cyber security course. This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.
 
This is an introductory course in cyber security and is the first of 3 full courses that will be provided through CYRIN this year.  Each course can be paused at any time where the student can come back and continue where he/she left off. At the end of each course, there is a multiple-choice test.  
 
This first course, Cyber Security Skills Foundation (CSSF) is taught by Kevin Cardwell, a friend of CYRIN and an internationally acclaimed cyber security trainer.
 
CYRIN is designed as an e-learning product to be used without an instructor. It can also work as a classroom (physical or virtual) tool to be used with an instructor. 
 
As a classroom tool, CYRIN incorporates a robust performance management capability and also the capability for the instructor and administrator to develop her or his exercises.
 
These courses using slides, video and a number of CYRIN labs, exercises and/or cyber-attack scenarios Cyber Security Skills Foundation (CSSF) has eight modules where six CYRIN labs and 14 “micro labs” have been integrated and developed specifically for the course.
 
To gain the skills needed to move on to more advanced security topics. The majority of professionals entering the field will lack the foundation that this course will bring and so it is important to complete the training. 
 
1. Learn how to execute a set of techniques that are critical to the     protection of your entire network
2. Learn the foundation components of the network
3. Explore the concepts of attacks at the packet level
4. Establish solid skills in Unix/Linux
5. Develop virtualisation knowledge
6. Gain an understand the hacking methodology
 
By taking this course you will learn the foundations of security, including in-depth knowledge of the TCP/IP network protocol.
 
• You will learn how to analyse packets for irregularities
• You will learn how to detect signs of crafted packets
• You will learn advanced protocol analysis techniques
• You will perform low-level protocol analysis
• You will learn functional skills in Unix and Linux
• You will learn the fundamentals of vulnerability assessment and the hacking methodology
 
Training Time
 
40 hours and this is self-paced. You can pause and continue at any time. 
40 CPEs awarded on successful completion. 
 
The name of this first course is Cyber Security Skills Foundation (CSSF)
 
Check it out for free HERE   
________________________________________________________________
 
 
« A New Generation Of Critical Vulnerabilities
Britain’s £9bn Cyber Security Sector »

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Bivio Networks

Bivio Networks

Bivio Networks is a leader in network security and control solutions.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Aquilai Cyber Intelligence

Aquilai Cyber Intelligence

Aquilai was founded by AI data scientists and security experts to solve the number one problem in cyber security – phishing.

AuditSafe

AuditSafe

AuditSafe provides audit services for Information Security, Risk Management and Corporate Governance.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.