New Cyber Training For Security Professionals

Promotion
 
 
In light of the almost complete lockdown in the US and Europe, CYRIN has launched its first full length cyber security course. This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.
 
This is an introductory course in cyber security and is the first of 3 full courses that will be provided through CYRIN this year.  Each course can be paused at any time where the student can come back and continue where he/she left off. At the end of each course, there is a multiple-choice test.  
 
This first course, Cyber Security Skills Foundation (CSSF) is taught by Kevin Cardwell, a friend of CYRIN and an internationally acclaimed cyber security trainer.
 
CYRIN is designed as an e-learning product to be used without an instructor. It can also work as a classroom (physical or virtual) tool to be used with an instructor. 
 
As a classroom tool, CYRIN incorporates a robust performance management capability and also the capability for the instructor and administrator to develop her or his exercises.
 
These courses using slides, video and a number of CYRIN labs, exercises and/or cyber-attack scenarios Cyber Security Skills Foundation (CSSF) has eight modules where six CYRIN labs and 14 “micro labs” have been integrated and developed specifically for the course.
 
To gain the skills needed to move on to more advanced security topics. The majority of professionals entering the field will lack the foundation that this course will bring and so it is important to complete the training. 
 
1. Learn how to execute a set of techniques that are critical to the     protection of your entire network
2. Learn the foundation components of the network
3. Explore the concepts of attacks at the packet level
4. Establish solid skills in Unix/Linux
5. Develop virtualisation knowledge
6. Gain an understand the hacking methodology
 
By taking this course you will learn the foundations of security, including in-depth knowledge of the TCP/IP network protocol.
 
• You will learn how to analyse packets for irregularities
• You will learn how to detect signs of crafted packets
• You will learn advanced protocol analysis techniques
• You will perform low-level protocol analysis
• You will learn functional skills in Unix and Linux
• You will learn the fundamentals of vulnerability assessment and the hacking methodology
 
Training Time
 
40 hours and this is self-paced. You can pause and continue at any time. 
40 CPEs awarded on successful completion. 
 
The name of this first course is Cyber Security Skills Foundation (CSSF)
 
Check it out for free HERE   
________________________________________________________________
 
 
« A New Generation Of Critical Vulnerabilities
Britain’s £9bn Cyber Security Sector »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

ANSI National Accreditation Board (ANAB)

ANSI National Accreditation Board (ANAB)

ANAB is the largest accreditation body in North America. The directory of members provides details of organisations offering certification services for cybersecurity related standards.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.