Cyber Security - Beginner Level

Difficulty: ⭐️⭐️☆☆☆

Description

This course introduces learners to the fundamentals of Cyber Security – a field of growing importance due to increasing reliance on computer systems. Through theoretical lectures and hands-on practice, students will learn how networked systems function, how to detect computer vulnerabilities, how to launch attacks and defend themselves from attacks, and how to protect themselves from Cyber Security threats.

Requirements

Basic computer skills

By the end of this course, students will achieve:

  • Programming skills with Bash scripting
  • Familiarity with the Linux Operating System, being able to work on and operate the Linux command line
  • Fundamental knowledge about networked systems and devices
  • Knowledge and practical skills to detect vulnerabilities, to analyze network traffic, and to hack computer systems and wireless networks
  • Understanding and hands-on experience on how to launch cyber attacks (e.g., Brute Force,…), and defend against attacks
  • Knowledge about compromising and protecting data

Curriculum For This Course

      1. Course introduction
      2. What is Cyber Security about?
      3. Why is Cyber Security important?
      4. Categorizing Cyber Security
      5. Methods of cyber attacks
      1. Essential computer terminology
      2. Linux vs. Windows vs. Mac OS
      3. Linux basic commands
      4. Linux File System
      5. Install/uninstall tools in Linux
      1. Privileges: read-write-execute
      2. Changing privileges for users/groups
      3. Hidden and protected files
      4. Write code with Bash scripting: Syntax, keywords
      5. Hands-on exercises: Writing Bash scripts
      1. User accounts
      2. Hashes
      3. Brute-forcing locally with Crunch and John
      4. Password lists, rainbow tables, OphCrack
      5. Introduction to Encryption
      6. TCP and SSH connections
      1. Computer vulnerabilities / Exploits
      2. Privilege escalation
      3. Keyloggers
      4. Malware
      5. How Antivirus works
      1. What is the Internet?
      2. Network ecosystem and concepts
      3. IP and MAC addresses
      4. OSI model  
      5. How packets are routed in Internet?
      6. Hands-on practices: Find routes, configure a home network
      1. What is the Internet?
      2. Network ecosystem and concepts
      3. IP and MAC addresses
      4. OSI model  
      5. How packets routed in Internet?
      6. Hands-on practices: Find routes, configure a home network
      1. How Wireless networks work
      2. Wireless Protocols and Standards
      3. Identifying wireless networks
      4. Accessing wireless networks
      5. Mapping wireless networks
      1. Steganography  
      2. Hashing Algorithms
      3. Encryption
      4. Public key cryptography
      5. Types of Cipher
      1. Building a Man-in-the-middle attack demo
      2. Cyber Security Test on Cyberium Arena

UPCOMING COURSES/WORKSHOPS

Group name Start date Session duration Number of sessions Standard price
Cyber Security Beginner Level (Group 1) - Limited Time Offer! Apr 5 (Fri) 15:00 - 17:00 2h 10 sessions (weekly) 60,000 JPY Register
Cyber Security Beginner Level (Group 3) - Limited Time Offer! Apr 6 (Sat) 13:00 - 15:00 2h 10 sessions (weekly) 60,000 JPY Register
Cyber Security Beginner Level (Group 4) - Limited Time Offer! Apr 7 (Sun) 18:00 - 20:00 2h 10 sessions (weekly) 60,000 JPY Register
Cyber Security Beginner Level (Group 2) - Limited Time Offer! Apr 6 (Sat) 10:00 - 12:00 2h 10 sessions (weekly) 60,000 JPY Register

LOOKING FOR OTHER OPTIONS?

Below are the courses that you may want to take after this course:

FEATURED MENTOR

Tokyo Techies Lecturer

Marlin Arnall

Cyber Security engineer and game enthusiast

Marlin is a passionate computer engineer with interest in cyber security. He has cultured a healthy paranoia about closed-source software, security threats, and data security. Marlin is very passionate about digital rights and protecting the open internet.

Ask him about how your devices can spy on you.