INTERACTIVE COURSE
Cyber Security Workbased Training Course
Objectives
- Understand the fundamental concepts of cyber security, including the various types of cyber threats and their potential impacts on organizations.
- Develop practical skills in identifying vulnerabilities within a network and implementing security measures to protect against cyber attacks.
- Gain proficiency in using cyber security tools and technologies, such as firewalls, intrusion detection systems, and encryption methods.

About this course
Our Cyber Security Workbased Training Course is designed to equip trainees with the essential knowledge and practical skills necessary to protect organizations against cyber threats. The course is structured to ensure a strong understanding of key concepts such as network security, ethical hacking, and risk management. Trainees will engage in real-world scenarios and hands-on projects to apply their learning and enhance their problem-solving abilities in the field of cyber security.
Skills You Will Gain
Syllabus
34 Lessons
Introduction to Cyber Security
This module provides an overview of cyber security concepts, the importance of cyber security in the modern world, and an introduction to common cyber threats and vulnerabilities.
Cyber Security Technologies
Explore the technologies and tools that are used to secure systems, including encryption, firewalls, and intrusion detection systems.
Secure Network Design
Learn about designing networks with security in mind, including the concepts of defense in depth and network segmentation.
Risk Management and Compliance
Understand the frameworks and methodologies for managing cyber risk and ensuring compliance with laws and regulations.
Cyber Security Operations
Dive into the day-to-day operations of a cyber security professional, including monitoring, incident detection, and response procedures.
Applied Cyber Security Practices
Apply the theoretical knowledge in practical scenarios including conducting vulnerability assessments and penetration testing.
Advanced Threats and Protections
Study advanced cyber threats such as APTs (Advanced Persistent Threats), zero-day attacks, and explore the protections available against them.
Cyber Security Policy and Strategy
Learn about the policies and strategies organizations can implement to enhance their cyber security posture, from the human factor to disaster recovery.