Tokyo Techies Cyber Security Training Program

Training for more than 5 people?

Contact info@tokyotechies.com

Includes:

  • 8 sessions of Classes
  • Tokyo Techies Custom Curriculum
  • Certificate On Completion

Cancellation before the second lesson is FREE of charge

Cyber Security

(Beginner – Intermediate)

Difficulty: 

Language: English

Last Updated:  27/09/2018

Description

This course introduces learners to the fundamentals of Cyber Security – a field of growing importance due to increasing reliance on computer systems. Through theoretical lectures and hands-on practice, students will learn how networked systems function, how to detect computer vulnerabilities, how to launch attacks and defend themselves from attacks, and how to protect themselves from Cyber Security threats.

Learning outcomes

By the end of this course, students will achieve:

  • Basic programming skills with Bash scripting
  • Familiarity with the Linux Operating System, being able to work on and operate the Linux command line
  • Fundamental knowledge about networked systems and devices
  • Knowledge and practical skills to detect vulnerabilities, to analyze network traffic, and to hack computer systems and wireless networks
  • Understanding and hands-on experience on how to launch cyber attacks (e.g., Brute Force,…), and defend against attacks
  • Knowledge about compromising and protecting data

REQUIREMENTS

  • Basic computer use
  • (optional) Basic programming
  • (optional) Linux familiarity

Curriculum For This Course

  • What is cyber security?
  • Why learn cyber security?
  • most common commands
  • Syntax and commands
  • How system passwords work
  • Brute-forcing local accounts
  • System exploits
  • Privilege escalation
  • Network addresses
  • OSI model
  • Network scanning
  • Packet sniffing
  • Getting wireless passwords
  • Cryptography and hashes
  • Encryption

Featured Author

Marlin Arnall

Cyber Security engineer and game enthusiast

Marlin is a passionate computer engineer with interest in cyber security. He has cultured a healthy paranoia about closed-source software, security threats, and data security. Marlin is very passionate about digital rights and protecting the open internet.

Ask him about how your devices can spy on you.