Certified Cyber-Security Specialist

Home Course Certified Cyber-Security Specialist


Course Details

Length: 5 days
Technology: Security
Price : +855 70 30 40 92 / +855 11 93 62 08
Chart With Us


Certified Cyber-Security Specialist

The Certified Cyber-Security Specialist training focuses on creating information security individuals who are trained in protecting, detecting and responding to threats on the network.

Information security individuals are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This training will prepare students with a fundamental understanding of the true construct of data transfer, network technologies, software technologies so that they understand how networks operate, understand what software automating is and how to analyses the subject material.

In addition, network defense fundamentals, application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis, and vulnerability scanning are also covered which will help information security individuals design greater network security policies and successful incident response plans.

Who Should Attend?

  • Anyone starting a career in Information Security / Cyber-Security.
  • IT professionals wanting to transition their career into Cyber-Security.
  • Anyone needing a robust introduction to Cyber-Security.
  • Anyone planning to work in a position that requires Cyber-Security knowledge.
  • Anyone with Information Security / Cyber-Security responsibilities.
  • Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.
  • Professionals are familiar with basic IT and Information Security concepts and who need to round out their knowledge.

Course Outline

Day 1:

Cyber-Security Essentials

  • Cyber-Security: The New Frontier
  • Cyber-Security & Cybercrime
  • Cyber-Security Management
  • Introduction to Cyber Terrorism
  • Internet Radicalization
  • Terrorist Use of the Internet
  • Cyber Terrorism Framework
  • Case Studies

Day 2:

Understanding Current Threats Landscape

  • CIS Top 20 Critical Controls
  • Cyber Range
  • Next Gen-Firewalls

New Age Threats

  • Viruses & Worms
  • Malware
  • Zero-Day Attacks
  • Vulnerability Exploits
  • Phishing / Social Engineering
  • Cyber Espionage / Data Theft

Day 3:


  • Port Scan
  • Web-Based Recon & Information Gathering
  • Command Line Query

Vulnerability Management

  • Host Scanning
  • Web Application Scanning
  • CVE
  • Defending Against CVE Vulnerability Attacks

Day 4:

Monitoring & Defending Against Advanced Attacks

  • Splunk - A SIEM Monitoring Tool
  • Defending Against IP Layer DDOS Attacks
  • Defending Against Transport Layer DDOS Attacks
  • Defending Against Application Layer DDOS Attacks
  • Defending Against Botnet & C&C

Advanced Security Operations

  • Malware Blocking
  • Data Leak Prevention (DLP) / Data Filtering
  • File Blocking
  • URL Filtering
  • Evasion Tactics

Day 5:

Introduction to Security Incident & Incident Handling

  • Security Incident, Processes & Framework
  • Incident Handling
  • Security Incident Priority
  • Handling Intrusion Incident
  • Handling Malware Incident
  • Handling Phishing Incident
  • Handling Spam Incident

Log Analysis

  • Introduction to Log Analysis
  • Log Management
  • Log Visualization
  • Log Analysis
  • Hands-On

Learning Outcomes

Upon completion of this course, you will be able to:

  • Analyze and establish security requirements for your systems/networks.
  • Defend systems against unauthorized access, modification and/or destruction.
  • Configure and support security tools such as firewalls, anti-virus software, patch management systems, etc.
  • Define access privileges, control structures and resources.
  • Perform vulnerability testing, risk analyses, and security assessments.
  • Identify abnormalities and report violations.
  • Oversee and monitor routine security administration.
  • Develop and update business continuity and disaster recovery protocols.


This training does not impose any prerequisites, however, we recommend that candidates have at least 1 year of IT administration experience.

Subscribe to us!

Subscribe to us now to get the latest news, updates and special offers delivered directly to your inbox.