Cybersecurity Foundations

Get Course Information

Connect for information with us at info@velocityknowledge.com

How would you like to learn?*

Duration: 3 days instructor-led

Course Description

Cyber Security Foundations is a 3-day instructor-led course designed to introduce IT professionals, analysts, and technical learners to the core principles of cyber security. The course provides a structured overview of essential security concepts, common threat types, risk mitigation techniques, and foundational practices for securing networks, systems, and data. Through a mix of lecture, demonstrations, and guided labs, participants will gain the skills necessary to identify vulnerabilities, understand attacker behavior, and apply basic defense strategies.

This course serves as a strong starting point for individuals preparing for entry-level security roles or certifications such as CompTIA Security+, GIAC Security Essentials (GSEC), or Microsoft SC-900.

Target Audience

  • IT support staff, helpdesk technicians, and system administrators
  • Entry-level cyber security professionals and analysts
  • Students or career changers seeking to enter the security field
  • Professionals seeking foundational security knowledge to complement their existing IT skill set

Prerequisites

  • Familiarity with operating systems such as Windows or Linux
  • Basic understanding of networking (IP addressing, DNS, TCP/UDP)
  • Experience with general IT support or system administration is helpful but not required

Key Learning Objectives

By the end of the course, participants will be able to:

  • Define core cyber security concepts and terminology
  • Recognize common threat types, attack vectors, and vulnerabilities
  • Apply basic controls to harden systems and secure networks
  • Analyze logs and indicators of compromise
  • Understand the role of security policies, risk management, and compliance

Course Takeaways

  • Foundational knowledge of modern cyber security threats and defenses
  • Hands-on experience with essential tools and techniques
  • Templates for risk assessments and asset classification
  • A basic security checklist for small networks and systems
  • Certificate of completion and continuing education credits where applicable

Module 1: Introduction to Cyber Security Principles

Topics Covered

  • The CIA Triad and fundamental principles
  • Understanding the threat landscape
  • Types of attackers: internal vs external, opportunistic vs targeted
  • Common attack methods: malware, phishing, social engineering, DDoS
  • Overview of regulatory frameworks and security standards (NIST, ISO, HIPAA, PCI-DSS)

Hands-On Labs

  • Lab 1: Simulate a phishing email using a safe training platform and analyze the impact
  • Lab 2: Use MITRE ATT&CK Navigator to map a real-world attack
  • Lab 3: Conduct a simple asset inventory and risk assessment using a provided worksheet

Module 2: Securing Networks and Systems

Topics Covered

  • Fundamentals of network security: firewalls, IDS/IPS, segmentation
  • Secure protocols: HTTPS, SSH, VPN, RDP hardening
  • Introduction to endpoint security: antivirus, patching, secure configurations
  • Password management and authentication best practices
  • System hardening techniques for Windows and Linux

Hands-On Labs

  • Lab 4: Configure a basic host firewall and apply allow/deny rules
  • Lab 5: Harden a Windows or Linux machine using a secure configuration checklist
  • Lab 6: Use Nmap to scan for open ports and identify exposed services on a simulated network

Module 3: Monitoring, Response, and Security Operations

Topics Covered

  • Logging and monitoring fundamentals
  • Understanding security alerts and triage
  • Indicators of compromise (IOCs) and basic log analysis
  • Introduction to SIEM (Security Information and Event Management)
  • Basics of incident response: containment, eradication, and recovery
  • Security culture and user awareness training

Hands-On Labs

  • Lab 7: Use Windows Event Viewer and Linux log files to identify unusual activity
  • Lab 8: Analyze a sample security incident and draft an incident response report
  • Lab 9: Perform basic queries and alert investigation using an open-source SIEM like Wazuh or Splunk Free

Contact us to customize this course for your team and for your organization.

Search

Interested?
Cybersecurity Foundations

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.