IT, Telecommunication , Networking Training Courses

Cyber security Foundations

Duration
2025-07-13 10 Days 2025-07-24
Attendance

Hotel Meeting Room

Hotel Meeting Room
Course code
IT-739
Copied !
City / venue
Amman

Classroom

Fees / hours
4750 $ | 50 Hours

Course registration form

Candidate Data

Candidate full name *
Email *
Private phone number *

Work phone number

Optional

Country & City *
Company / Employer *

Invoice Recipient Data

Recipient name *
Recipient phone number *
work phone number *

Recipient email

Optional

Recipient work address details

Optional



Sending course brochure to my e-mail

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Email *

Private phone number

Optional



Call me back

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Private phone number *
Company / Employer *


Course Inquiry

Please provide us with your contacts with your inquiry, and we will answer it as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



In-house proposal

Please provide us with your contacts and the details of the needed in-house proposal, and we will contact you as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



Course details

Overview ?

COURSE OVERVIEW

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets,

 

WHAT YOU'LL LEARN
  • Increase your awareness of security
  • Interpret/analyze tool output for network mapping/footprinting
  • Reduce attack surface of systems
  • Review networking as it applies to security controls
  • Explore different data protection principles
  • Examine the role of PKI/certificates in building trusted relationships between devices in a network
  • Implement login security and other identity management solutions
  • Reduce attack surface of network devices
  • Explore current malware threats and anti-malware solutions
  • Explore social engineering threats, methods, and techniques
  • Examine software vulnerabilities and security solutions for reducing the risk of exploitation
  • Explain monitoring capabilities and requirements and how those may raise privacy concerns
  • Identify physical security controls and the relationship between physical and IT security
  • Explain incident response capabilities
  • Identify legal considerations and investigative techniques when it comes to cybersecurity
  • Research trends in cybersecurity

 

OUTLINE

1. Cybersecurity Awareness

  • What is security?
  • Confidentiality, integrity, and availability
  • Security baselining
  • Security concerns: Humans
  • Types of threats
  • Security controls
  • What is hacking?
  • Risk management
  • Data in motion vs. data at rest
  • Module review

2. Network Discovery

  • Networking review
  • Discovery, footprinting, and scanning
  • Common vulnerabilities and exposures
  • Security policies
  • Vulnerabilities
  • Module review

3. Systems Hardening

  • What is hardening?
  • Types of systems that can be hardened
  • Security baselines
  • How to harden systems
  • Hardening systems by role
  • Mobile devices
  • Hardening on the network
  • Analysis tools
  • Authentication, authorization, and accounting
  • Physical security
  • Module review

4. Security Architecture

  • Security architecture
  • Network devices
  • Network zones
  • Network segmentation
  • Network Address Translation
  • Network Access Control
  • Module review

5. Data Security

  • Cryptography
  • Principles of permissions
  • Steganography
  • Module review

6. Public Key Infrastructure

  • Public key infrastructure
  • Certification authorities
  • Enabling trust
  • Certificates
  • CA management
  • Module review

7. Identity Management

  • What is identity management?
  • Personally identifiable information
  • Authentication factors
  • Directory services
  • Kerberos
  • Windows NT LAN Manager
  • Password policies
  • Cracking passwords
  • Password assessment tools
  • Password managers
  • Group accounts
  • Service accounts
  • Federated identities
  • Identity as a Service
  • Module review

8. Network Hardening

  • Limiting remote admin access
  • AAA: Administrative access
  • Simple Network Management Protocol
  • Network segmentation
  • Limiting physical access
  • Establishing secure access
  • Network devices
  • Fundamental device protection summary
  • Traffic filtering best practices
  • Module review

9. Malware

  • What is malware?
  • Infection methods
  • Types of malware
  • Backdoors
  • Countermeasures
  • Protection tools
  • Module review

10. Social Engineering

  • What is social engineering?
  • Social engineering targets
  • Social engineering attacks
  • Statistical data
  • Information harvesting
  • Preventing social engineering
  • Cyber awareness: Policies and procedures
  • Social media
  • Module review

11. Software Security

  • Software engineering
  • Security guidelines
  • Software vulnerabilities
  • Module review

12. Environment Monitoring

  • Monitoring
  • Monitoring vs. logging
  • Monitoring/logging benefits
  • Logging
  • Metrics
  • Module review

13. Physical Security

  • What is physical security?
  • Defense in depth
  • Types of physical security controls
  • Device security
  • Human security
  • Security policies
  • Equipment tracking
  • Module review

14. Incident Response

  • Disaster types
  • Incident investigation tips
  • Business continuity planning
  • Disaster recovery plan
  • Forensic incident response
  • Module review

15. Legal Considerations

  • Regulatory compliance
  • Cybercrime
  • Module review

16. Trends in Cybersecurity

  • Cybersecurity design constraints
  • Cyber driving forces
  • How connected are you?
  • How reliant on connectivity are you?
  • Identity management
  • Cybersecurity standards
  • Cybersecurity training

17. Course Look Around

  • Looking back
  • Looking forward
  • Planning your journey

Day 1

Asset Cost Management Introduction

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 2

Laying the Groundwork

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 3

Applying the Value based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 4

Ensuring the Continuity of the Value-based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 5

Supporting Process that Lower Life-cycle costs

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Training Methodology

Pathways Training and consulting adopts the newest techniques of human resources Training and consulting and, with the following:

  • Theoretical lectures are delivered via PowerPoint and visual displays (videos and short films)
  • Making scientific evaluation to the trainee (before and after)
  • Brainstorming and role-playing
  • Using case studies related to the scientific material being delivered and the trainees' work.
  • The participants get the scientific and practical material printed and on CDs and Flash memories.
  • Preparing records and reports of the participants' attendance and results, with a general evaluation of the training program.
  • A group of the best trainers and experts in all fields and specialties professionally prepares the scientific material.
  • After finishing the course, the participants get certificates of attendance signed, certified, and issued by pathways Training and consulting.
  • Our training programs start at 9:00 o'clock in the morning and end at 2:00 in the afternoon, with snack buffet during the lectures.
  • Providing a lunch buffet during the training program period, with organizing a lunch party on the training program final day for taking some photos and certificate awarding.
Different venues & timings for this course

Course name

Duration

City

Price

Cyber security Foundations

09, Mar 2025 20, Mar 2025

Sharm ElShaikh

4750$

Cyber security Foundations

17, Mar 2025 28, Mar 2025

Kuala Lumpur

4500$

Cyber security Foundations

24, Mar 2025 04, Apr 2025

Beijing

6950$

Cyber security Foundations

30, Mar 2025 10, Apr 2025

Marrakesh

4750$

Cyber security Foundations

31, Mar 2025 11, Apr 2025

Istanbul

4750$

Cyber security Foundations

07, Apr 2025 18, Apr 2025

London

6950$

Cyber security Foundations

28, Apr 2025 09, May 2025

Madrid

4950$

Cyber security Foundations

04, May 2025 15, May 2025

Casablanca

4950$

Cyber security Foundations

05, May 2025 16, May 2025

Marbella

6950$

Cyber security Foundations

19, May 2025 30, May 2025

Toronto

7250$

Cyber security Foundations

26, May 2025 06, Jun 2025

Amsterdam

6950$

Cyber security Foundations

02, Jun 2025 13, Jun 2025

Trabzon

5750$

Cyber security Foundations

08, Jun 2025 19, Jun 2025

Cairo

3950$

Cyber security Foundations

16, Jun 2025 27, Jun 2025

Munich

6950$

Cyber security Foundations

30, Jun 2025 11, Jul 2025

Berlin

6950$

Cyber security Foundations

13, Jul 2025 24, Jul 2025

Amman

4750$

Cyber security Foundations

21, Jul 2025 01, Aug 2025

Bangkok

6950$

Cyber security Foundations

27, Jul 2025 07, Aug 2025

Doha

5500$

Cyber security Foundations

28, Jul 2025 08, Aug 2025

Rome

6950$

Cyber security Foundations

03, Aug 2025 14, Aug 2025

Khobar

4750$

Cyber security Foundations

04, Aug 2025 15, Aug 2025

Singapore

6950$

Cyber security Foundations

10, Aug 2025 21, Aug 2025

Riyadh

4750$

Cyber security Foundations

11, Aug 2025 22, Aug 2025

Jakarta

4950$

Cyber security Foundations

17, Aug 2025 28, Aug 2025

Muscat

4750$

Cyber security Foundations

07, Sep 2025 18, Sep 2025

Tunisia

5250$

Cyber security Foundations

15, Sep 2025 26, Sep 2025

Paris

6950$

Cyber security Foundations

28, Sep 2025 09, Oct 2025

Beirut

4750$

Cyber security Foundations

05, Oct 2025 16, Oct 2025

Jeddah

4750$

Cyber security Foundations

06, Oct 2025 17, Oct 2025

Milan

6950$

Cyber security Foundations

13, Oct 2025 24, Oct 2025

Zurich

6950$

Cyber security Foundations

20, Oct 2025 31, Oct 2025

Geneva

6950$

Cyber security Foundations

09, Nov 2025 20, Nov 2025

Kuwait

4750$

Cyber security Foundations

23, Nov 2025 04, Dec 2025

DUBAI

4750$

Cyber security Foundations

30, Nov 2025 11, Dec 2025

Manama

4750$

Cyber security Foundations

01, Dec 2025 12, Dec 2025

Barcelona

6950$

Cyber security Foundations

15, Dec 2025 26, Dec 2025

Vienna

6950$

Cyber security Foundations

22, Dec 2025 02, Jan 2026

Brussels

6950$

Cyber security Foundations

29, Dec 2025 09, Jan 2026

Prague

6950$

Have a look too on these courses