Cybersecurity for End Users Training Course

Cybersecurity for End Users Training Course for Beginners

Call Now

Enroll Now

Email Us

Cybersecurity for End Users Training Course For Beginners Summary

Join us for a 16 hours Instructor-led Cybersecurity for end users training course to be taught over 4 weeks, 8 sessions, 2 sessions per week, 2 hours per session.

  • All Published Ticket Prices are in US Dollars
  • The course will be taught in English language

Cybersecurity for End Users Training Course for Beginners Schedule

Please choose from one of the dates in the table below to begin your enrollment :

Dates Weekly Schedule (US Pacific Time)* Price Add to Cart
Dec 6 to Dec 29 Mon/Wed 5:30 PM - 7:30 PM each day $394.00 Add to cart
Dec 7 to Dec 30 Tue/Thu 7:30 AM - 9:30 AM each day $394.00 Add to cart
Jan 8 to Jan 30 Sat/Sun 7:30 AM - 9:30 AM each day $394.00 Add to cart
Jan 10 to Feb 2 Mon/Wed 5:30 PM - 7:30 PM each day $394.00 Add to cart
Jan 11 to Feb 3 Tue/Thu 7:30 AM - 9:30 AM each day $394.00 Add to cart
Feb 5 to Feb 27 Sat/Sun 7:30 AM - 9:30 AM each day $394.00 Add to cart
Feb 7 to Mar 2 Mon/Wed 5:30 PM - 7:30 PM each day $394.00 Add to cart
Feb 8 to Mar 3 Tue/Thu 7:30 AM - 9:30 AM each day $394.00 Add to cart
Mar 14 to Apr 6 Mon/Wed 6:30 PM - 8:30 PM each day $394.00 Add to cart
Mar 15 to Apr 7 Tue/Thu 8:30 AM - 10:30 AM each day $394.00 Add to cart
Mar 19 to Apr 10 Wed/Sun 8:30 AM - 10:30 AM each day $394.00 Add to cart
*click on date/time hyperlink to add your location and find local date/time for first session
Dates and Weekly Schedule (US Pacific Time)* Price
Dec 6 to Dec 29
Mon/Wed 5:30 PM - 7:30 PM each day
$394.00
Enroll
Dec 7 to Dec 30
Tue/Thu 7:30 AM - 9:30 AM each day
$394.00
Enroll
Jan 8 to Jan 30
Sat/Sun 7:30 AM - 9:30 AM each day
$394.00
Enroll
Jan 10 to Feb 2
Mon/Wed 5:30 PM - 7:30 PM each day
$394.00
Enroll
Jan 11 to Feb 3
Tue/Thu 7:30 AM - 9:30 AM each day
$394.00
Enroll
Feb 5 to Feb 27
Sat/Sun 7:30 AM - 9:30 AM each day
$394.00
Enroll
Feb 7 to Mar 2
Mon/Wed 5:30 PM - 7:30 PM each day
$394.00
Enroll
Feb 8 to Mar 3
Tue/Thu 7:30 AM - 9:30 AM each day
$394.00
Enroll
Mar 14 to Apr 6
Mon/Wed 6:30 PM - 8:30 PM each day
$394.00
Enroll
Mar 15 to Apr 7
Tue/Thu 8:30 AM - 10:30 AM each day
$394.00
Enroll
Mar 19 to Apr 10
Wed/Sun 8:30 AM - 10:30 AM each day
$394.00
Enroll
*click on date/time hyperlink to add your location and find local date/time for first session

Course Objectives

  • Awareness of the latest terminologies related to cyber security.
  • Assisting in developing a strategic view on addressing cyber security risks.
  • Building a practical perspective to comprehend the possible impacts of such risks.
  • Enabling the participants to provide appropriate direction and necessary cyber security context-driven oversight to protect their environments within their organizations.

Features and Benefits

  • 16 Hours, 8 sessions, 4 weeks of total Instructor-led and guided training
  • Training material, instructor handouts and access to useful resources on the cloud provided
  • Practical Hands-on Lab exercises provided
  • Actual code and scripts provided
  • Real-life Scenarios

Who can take this course

  • This course is specifically designed for computer users who use the internet to extensively to work, study and play.

Prerequisites

Basic knowledge of :

  • Computer System
  • Internet

Course Outline

Session 1

  • Who is a Hacker?
  • Why People Hack?
  • What people Hack?
  • What is information?
  • How much worth my Information is?
  • Types of Hackers
  • Approach of a Hacker
  • Steps in Hacking
  • Information gathering Techniques (How to protect
  • your information?)
  • How Hackers gather information about us?
  • Does everybody know about you?
  • Where do they get it? (Demo)
  • What is Google and how does it work?
  • Google Hacking (Demo)
  • Accessing Public Cameras
  • How can Google hacking help an Ethical Hacker?

Session 2

  • Phases of Ethical Hacking 
  • Basics of Internet & Networking
  • What is a Network?
  • Types of network –
  • LANs, WANs & WLANs
  • What is Internet?
  • History of the Internet
  • Basic Structure
  • What is a Server?
  • What is an IP Address?
  • What is a domain name?
  • What is a browser?
  • Client-Server Relationship Model
  • What is a port?
  • Network scanning & its tools (Demo)

Session 3

  • Home Network
  • Network Devices
  • Steps for Home Networking
  • Minimum Requirement to setup a LAN Network
  • Securing Network Connections
  • Network Adapters
  • Troubleshooting with Network Adapters

Session 4

  • Desktop/PC Security,
  • Antivirus & IDS
  • Types of viruses
  • What are anti-viruses?
  • How they detect a virus?
  • What is firewall?
  • What are Trojan & Spywares?
  • Passwords Security
  • Types of Passwords
  • Build a Strong Password
  • Password Encryption
  • Password Cracking 
  • (Password Recovery)
  • Protection from Password Cracking

Session 5

  • Web Security
  • How the web really works 
  • Introduction
  • Security threats
  • Best Practices Recommendation
  • Security standards
  • Security technology
  • Top Ten Most Critical Web Application Vulnerabilities(OWASP)
  • DOS/DDOS Attack
  • Introduction to Kali Linux

Session 6

  • Internet Security
  • Browser Security
  • Internet Explorer Security & Privacy Settings
  • Mozilla Firefox: Security & Privacy Settings
  • Google Chrome Privacy and Security Settings
  • Instant Messaging
  • Security Issues Measures
  • Searching on the Web
  • Online Gaming Risks
  • Social Risks
  • Social Engineering
  • How the Malicious Users Make Money
  • Recognize Administrator Mode Risks
  • Child Online Safety
  • Risks Involved Online Stealth Sites and Misleading URLs
  • Risks Involved in Social Networking Websites
  • Chat Rooms

Session 7

  • Securing Online Transactions
  • Online Shopping
  • Online Banking
  • Credit Card Payments
  • Credit Card Frauds
  • Guidelines for Ensuring Credit Card Safety
  • Securing Online Transactions
  • Online Payment Services
  • Choosing a Secure Online Payment Service
  • SSL and the Padlock Symbol
  • What Does the SSL Show?
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • Rating Icons

Session 8

  • Cyber Laws
  • Introduction
  • Type of cyber crimes
  • Impact of cyber crimes in USA
  • Cyber Laws in USA
  • IT ACT provision
  • Cyber Laws Amendment
  • FBI role in preventing Cyber Crime
  • Conclusion
  • Encryption
  • Decryption
  • Cryptography
  • Steganography 

Refund Policy

  • 100% refund can be applied if request is initiated 24 hours before the 1st course session.
  • If a class is rescheduled/cancelled by the organizer, registered students will be offered a credit towards any future course or a 100% refund