New Cyber Training For Security Professionals

Promotion
 
 
In light of the almost complete lockdown in the US and Europe, CYRIN has launched its first full length cyber security course. This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.
 
This is an introductory course in cyber security and is the first of 3 full courses that will be provided through CYRIN this year.  Each course can be paused at any time where the student can come back and continue where he/she left off. At the end of each course, there is a multiple-choice test.  
 
This first course, Cyber Security Skills Foundation (CSSF) is taught by Kevin Cardwell, a friend of CYRIN and an internationally acclaimed cyber security trainer.
 
CYRIN is designed as an e-learning product to be used without an instructor. It can also work as a classroom (physical or virtual) tool to be used with an instructor. 
 
As a classroom tool, CYRIN incorporates a robust performance management capability and also the capability for the instructor and administrator to develop her or his exercises.
 
These courses using slides, video and a number of CYRIN labs, exercises and/or cyber-attack scenarios Cyber Security Skills Foundation (CSSF) has eight modules where six CYRIN labs and 14 “micro labs” have been integrated and developed specifically for the course.
 
To gain the skills needed to move on to more advanced security topics. The majority of professionals entering the field will lack the foundation that this course will bring and so it is important to complete the training. 
 
1. Learn how to execute a set of techniques that are critical to the     protection of your entire network
2. Learn the foundation components of the network
3. Explore the concepts of attacks at the packet level
4. Establish solid skills in Unix/Linux
5. Develop virtualisation knowledge
6. Gain an understand the hacking methodology
 
By taking this course you will learn the foundations of security, including in-depth knowledge of the TCP/IP network protocol.
 
• You will learn how to analyse packets for irregularities
• You will learn how to detect signs of crafted packets
• You will learn advanced protocol analysis techniques
• You will perform low-level protocol analysis
• You will learn functional skills in Unix and Linux
• You will learn the fundamentals of vulnerability assessment and the hacking methodology
 
Training Time
 
40 hours and this is self-paced. You can pause and continue at any time. 
40 CPEs awarded on successful completion. 
 
The name of this first course is Cyber Security Skills Foundation (CSSF)
 
Check it out for free HERE   
________________________________________________________________
 
 
« A New Generation Of Critical Vulnerabilities
Britain’s £9bn Cyber Security Sector »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

CyberSafe

CyberSafe

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services including network security, managed security, incident response and forensic analysis.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.