New Cyber Training For Security Professionals

Promotion
 
 
In light of the almost complete lockdown in the US and Europe, CYRIN has launched its first full length cyber security course. This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.
 
This is an introductory course in cyber security and is the first of 3 full courses that will be provided through CYRIN this year.  Each course can be paused at any time where the student can come back and continue where he/she left off. At the end of each course, there is a multiple-choice test.  
 
This first course, Cyber Security Skills Foundation (CSSF) is taught by Kevin Cardwell, a friend of CYRIN and an internationally acclaimed cyber security trainer.
 
CYRIN is designed as an e-learning product to be used without an instructor. It can also work as a classroom (physical or virtual) tool to be used with an instructor. 
 
As a classroom tool, CYRIN incorporates a robust performance management capability and also the capability for the instructor and administrator to develop her or his exercises.
 
These courses using slides, video and a number of CYRIN labs, exercises and/or cyber-attack scenarios Cyber Security Skills Foundation (CSSF) has eight modules where six CYRIN labs and 14 “micro labs” have been integrated and developed specifically for the course.
 
To gain the skills needed to move on to more advanced security topics. The majority of professionals entering the field will lack the foundation that this course will bring and so it is important to complete the training. 
 
1. Learn how to execute a set of techniques that are critical to the     protection of your entire network
2. Learn the foundation components of the network
3. Explore the concepts of attacks at the packet level
4. Establish solid skills in Unix/Linux
5. Develop virtualisation knowledge
6. Gain an understand the hacking methodology
 
By taking this course you will learn the foundations of security, including in-depth knowledge of the TCP/IP network protocol.
 
• You will learn how to analyse packets for irregularities
• You will learn how to detect signs of crafted packets
• You will learn advanced protocol analysis techniques
• You will perform low-level protocol analysis
• You will learn functional skills in Unix and Linux
• You will learn the fundamentals of vulnerability assessment and the hacking methodology
 
Training Time
 
40 hours and this is self-paced. You can pause and continue at any time. 
40 CPEs awarded on successful completion. 
 
The name of this first course is Cyber Security Skills Foundation (CSSF)
 
Check it out for free HERE   
________________________________________________________________
 
 
« A New Generation Of Critical Vulnerabilities
Britain’s £9bn Cyber Security Sector »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Devel Group

Devel Group

Devel are a LATAM cybersecurity company specialized in providing services in the financial and enterprise sector.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.

HCLTech

HCLTech

HCLTech is a global technology company delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products.