Duration: 3 days instructor-led
Course Description
Cyber Security Foundations is a 3-day instructor-led course designed to introduce IT professionals, analysts, and technical learners to the core principles of cyber security. The course provides a structured overview of essential security concepts, common threat types, risk mitigation techniques, and foundational practices for securing networks, systems, and data. Through a mix of lecture, demonstrations, and guided labs, participants will gain the skills necessary to identify vulnerabilities, understand attacker behavior, and apply basic defense strategies.
This course serves as a strong starting point for individuals preparing for entry-level security roles or certifications such as CompTIA Security+, GIAC Security Essentials (GSEC), or Microsoft SC-900.
Target Audience
- IT support staff, helpdesk technicians, and system administrators
- Entry-level cyber security professionals and analysts
- Students or career changers seeking to enter the security field
- Professionals seeking foundational security knowledge to complement their existing IT skill set
Prerequisites
- Familiarity with operating systems such as Windows or Linux
- Basic understanding of networking (IP addressing, DNS, TCP/UDP)
- Experience with general IT support or system administration is helpful but not required
Key Learning Objectives
By the end of the course, participants will be able to:
- Define core cyber security concepts and terminology
- Recognize common threat types, attack vectors, and vulnerabilities
- Apply basic controls to harden systems and secure networks
- Analyze logs and indicators of compromise
- Understand the role of security policies, risk management, and compliance
Course Takeaways
- Foundational knowledge of modern cyber security threats and defenses
- Hands-on experience with essential tools and techniques
- Templates for risk assessments and asset classification
- A basic security checklist for small networks and systems
- Certificate of completion and continuing education credits where applicable
Module 1: Introduction to Cyber Security Principles
Topics Covered
- The CIA Triad and fundamental principles
- Understanding the threat landscape
- Types of attackers: internal vs external, opportunistic vs targeted
- Common attack methods: malware, phishing, social engineering, DDoS
- Overview of regulatory frameworks and security standards (NIST, ISO, HIPAA, PCI-DSS)
Hands-On Labs
- Lab 1: Simulate a phishing email using a safe training platform and analyze the impact
- Lab 2: Use MITRE ATT&CK Navigator to map a real-world attack
- Lab 3: Conduct a simple asset inventory and risk assessment using a provided worksheet
Module 2: Securing Networks and Systems
Topics Covered
- Fundamentals of network security: firewalls, IDS/IPS, segmentation
- Secure protocols: HTTPS, SSH, VPN, RDP hardening
- Introduction to endpoint security: antivirus, patching, secure configurations
- Password management and authentication best practices
- System hardening techniques for Windows and Linux
Hands-On Labs
- Lab 4: Configure a basic host firewall and apply allow/deny rules
- Lab 5: Harden a Windows or Linux machine using a secure configuration checklist
- Lab 6: Use Nmap to scan for open ports and identify exposed services on a simulated network
Module 3: Monitoring, Response, and Security Operations
Topics Covered
- Logging and monitoring fundamentals
- Understanding security alerts and triage
- Indicators of compromise (IOCs) and basic log analysis
- Introduction to SIEM (Security Information and Event Management)
- Basics of incident response: containment, eradication, and recovery
- Security culture and user awareness training
Hands-On Labs
- Lab 7: Use Windows Event Viewer and Linux log files to identify unusual activity
- Lab 8: Analyze a sample security incident and draft an incident response report
- Lab 9: Perform basic queries and alert investigation using an open-source SIEM like Wazuh or Splunk Free