0% found this document useful (0 votes)
5 views4 pages

Cybersecurity Training Class 1

The document outlines a Cybersecurity Training Program focusing on the fundamentals of cybersecurity, including key concepts like the CIA Triad, Defense in Depth, and the Zero Trust model. It highlights the current threat landscape, various cybersecurity career paths, and provides guidance on setting up a personal cyber lab for hands-on practice. Additionally, it includes assignments and mini-projects to reinforce learning through research and practical application.

Uploaded by

onojasunday6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Cybersecurity Training Class 1

The document outlines a Cybersecurity Training Program focusing on the fundamentals of cybersecurity, including key concepts like the CIA Triad, Defense in Depth, and the Zero Trust model. It highlights the current threat landscape, various cybersecurity career paths, and provides guidance on setting up a personal cyber lab for hands-on practice. Additionally, it includes assignments and mini-projects to reinforce learning through research and practical application.

Uploaded by

onojasunday6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cybersecurity Training Program - Class 1

Slide 1: Title Slide


Class 1: Introduction to Cybersecurity & Fundamentals

Cybersecurity Training Program

[Insert Date]

📍 Facilitator: [Your Name]

Slide 2: Learning Objectives


🎯 Learning Objectives

• Understand the basics of cybersecurity and the current threat landscape.


• Learn key security concepts: CIA Triad, Defense in Depth, Zero Trust.
• Explore various cybersecurity career paths.
• Set up a personal cyber lab for hands-on practice.

Slide 3: What is Cybersecurity?


📌 Overview of Cybersecurity

Definition: Cybersecurity is the practice of protecting systems, networks, and programs


from digital attacks.

🔐 Goal: Ensure Confidentiality, Integrity, and Availability of digital assets.

Slide 4: Current Threat Landscape


📌 Cyber Threat Landscape

• 🛑 Ransomware (e.g., WannaCry, REvil)


• 🎣 Phishing Attacks
• 🔗 Supply Chain Attacks (e.g., SolarWinds)
• Nation-State Attacks
• 👤 Insider Threats
Slide 5: Key Security Concepts - CIA Triad

• Confidentiality: Prevent unauthorized access


• Integrity: Protect data from unauthorized changes
• Availability: Ensure systems are accessible when needed

Slide 6: Defense in Depth


Multi-layered Security Approach

• Perimeter Security (Firewalls)


• Network Segmentation
• Endpoint Protection
• User Awareness & Training

Slide 7: Zero Trust Model


🔐 Zero Trust Principles

• "Never trust, always verify"


• Continuous validation of identities and access
• Least privilege access model
• Useful for cloud-native and remote environments

Slide 8: Cybersecurity Career Pathways


📌 Career Opportunities in Cybersecurity

Role Responsibilities Tools Used

Security Analyst Monitor security alerts, SIEMs (Splunk, QRadar), AV


incidents

SOC Analyst Work in Security IDS/IPS, Wireshark, EDR


Operations Centers

Penetration Tester Ethical hacking, find Kali Linux, Metasploit


vulnerabilities

GRC Analyst Risk, compliance, policy and GRC tools, ISO/NIST


audit Frameworks

Slide 9: Setting Up a Cyber Lab


Hands-On Practice Environment

Tools Needed:
• VirtualBox or VMware
• Kali Linux ISO
• Optional: AWS, Azure, TryHackMe, Hack The Box

Slide 10: Cyber Lab Setup Steps


🧰 Steps to Set Up Kali Linux VM:

1. Install VirtualBox
2. Download Kali Linux ISO
3. Create VM with:
• 2GB RAM
• 2 CPU Cores
• 20GB Disk
4. Attach ISO & Install Kali
5. Take a screenshot of Kali Desktop

Slide 11: Assignment


📝 Assignment

Topic: Research a recent cybersecurity breach (e.g., SolarWinds, Equifax)


Include:
• Attack vector
• Impact
• Response measures
• Lessons learned
📄 Length: 1 page
Slide 12: Mini-Project
💻 Mini-Project: Kali VM Setup

Task: Install and configure Kali Linux in VirtualBox


Deliverable: Screenshot of your Kali Desktop
✅ Ensure tools like Terminal and Firefox are visible

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy