Course Code: IT 126
186 Course Visits
Cybersecurity Foundations
Course Sector:
Information Technology
Course Dates and Locations
Choose a date and location to book your seat
No.
Date
Days
Location
Fees
Enrollment
01
13 - 17 Jul 2025
5 Days
Online, Virtual
$2,150
02
04 - 08 Aug 2025
5 Days
Geneva, Switzerland
$5,950
03
22 - 26 Dec 2025
5 Days
Dubai, UAE
$4,250
Introduction
Training course introducion / brief

Businesses and organizations have been spending a lot for cybersecurity. As our society is more technologically reliant than ever before, there is no sign that this trend will stop. Personal data that could result in identity theft is now posted to the public on our social media accounts. Sensitive information like social security numbers, credit card information and bank account details are now stored in cloud storage services like Dropbox or Google Drive. 

This training course is designed to provide participants with a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, they learn about current threat trends across the Internet and their impact on organizational security. The course will cover topics on  standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. 

Course Objectives
At the end of the training course, participants will be able to

  • Gain a comprehensive understanding and awareness of security
  • Identify different data protection principles
  • Interpret and analyze tool output for network mapping/footprinting
  • Reduce attack surface of systems and network devices
  • Review networking as it applies to security controls
  • Examine the role of PKI/certificates in building trusted relationships between devices in a network
  • Implement login security and other identity management solutions
  • Explore current malware threats, anti-malware solutions, social engineering threats, methods, and techniques
  • Analyze software vulnerabilities and security solutions for reducing the risk of exploitation
  • Identify physical security controls and the relationship between physical and IT security
  • Learn legal considerations and investigative techniques when it comes to cybersecurity

Course Audience
Who is this course for, and can benefit the most

This training course is designed for network professionals seeking to advance their knowledge and explore cybersecurity as a career path, and executives and managers seeking to improve their ability to communicate with security professionals and implement a robust security solution at the organizational level.

Course Outline
The course aims and learning outcomes

CYBERSECURITY AWARENESS

  • What is security?
  • Confidentiality, integrity, and availability
  • Security baselining
  • Security concerns: Humans
  • Types of threats
  • Security controls
  • What is hacking?
  • Risk management
  • Data in motion vs. data at rest
  • Module review

NETWORK DISCOVERY

  • Networking review
  • Discovery, footprinting, and scanning
  • Common vulnerabilities and exposures
  • Security policies
  • Vulnerabilities
  • Module review

SYSTEMS HARDENING

  • What is hardening?
  • Types of systems that can be hardened
  • Security baselines
  • How to harden systems
  • Hardening systems by role
  • Mobile devices
  • Hardening on the network
  • Analysis tools
  • Authentication, authorization, and accounting
  • Physical security
  • Module review

SECURITY ARCHITECTURE

  • Security architecture
  • Network devices
  • Network zones
  • Network segmentation
  • Network Address Translation
  • Network Access Control
  • Module review

DATA SECURITY

  • Cryptography
  • Principles of permissions
  • Steganography
  • Module review

PUBLIC KEY INFRASTRUCTURE

  • Public key infrastructure
  • Certification authorities
  • Enabling trust
  • Certificates
  • CA management
  • Module review

IDENTITY MANAGEMENT

  • What is identity management?
  • Personally identifiable information
  • Authentication factors
  • Directory services
  • Kerberos
  • Windows NT LAN Manager
  • Password policies
  • Cracking passwords
  • Password assessment tools
  • Password managers
  • Group accounts
  • Service accounts
  • Federated identities
  • Identity as a Service
  • Module review

NETWORK HARDENING

  • Limiting remote admin access
  • AAA: Administrative access
  • Simple Network Management Protocol
  • Network segmentation
  • Limiting physical access
  • Establishing secure access
  • Network devices
  • Fundamental device protection summary
  • Traffic filtering best practices
  • Module review

MALWARE

  • What is malware?
  • Infection methods
  • Types of malware
  • Backdoors
  • Countermeasures
  • Protection tools
  • Module review

SOCIAL ENGINEERING

  • What is social engineering?
  • Social engineering targets
  • Social engineering attacks
  • Statistical data
  • Information harvesting
  • Preventing social engineering
  • Cyber awareness: Policies and procedures
  • Social media
  • Module review

SOFTWARE SECURITY

  • Software engineering
  • Security guidelines
  • Software vulnerabilities
  • Module review

ENVIRONMENT MONITORING

  • Monitoring
  • Monitoring vs. logging
  • Monitoring/logging benefits
  • Logging
  • Metrics
  • Module review

PHYSICAL SECURITY

  • What is physical security?
  • Defense in depth
  • Types of physical security controls
  • Device security
  • Human security
  • Security policies
  • Equipment tracking
  • Module review

INCIDENT RESPONSE

  • Disaster types
  • Incident investigation tips
  • Business continuity planning
  • Disaster recovery plan
  • Forensic incident response
  • Module review

LEGAL CONSIDERATIONS

  • Regulatory compliance
  • Cybercrime
  • Module review

TRENDS IN CYBERSECURITY

  • Cybersecurity design constraints
  • Cyber driving forces
  • How connected are you?
  • How reliant on connectivity are you?
  • Identity management
  • Cybersecurity standards
  • Cybersecurity training

Providers and Associations
Providing the best training services and benefits to our valued clients
Boost certificate of completion
BOOST's Professional Attendance Certificate “BPAC” is always given to the delegates after completing the training course, and depends on their attendance of the program at a rate of no less than 80%, besides their active participation and engagement during the program sessions.
ENDORSED EDUCATION PROVIDER
Over all rating
Excellent
Average
Below average
Flexible deadlines
Customized dates accordance to your schedule
Shareable Certificate
Earn certificate upon completion
COURSE METHODOLOGY

Our Training programs are implemented by combining the participants' academic knowledge and practical practice (30% theoretical / 70% practical activities).

At The end of the training program, Participants are involved in practical workshop to show their skills in applying what they were trained for. A detailed report is submitted to each participant and the training department in the organization on the results of the participant's performance and the return on training. Our programs focus on exercises, case studies, and individual and group presentations.

Trending Courses
The most bespoke and flexible training courses
20
Jan
- 05 -
Days
Certified Treasury Professional
Dubai, UAE
18
Aug
- 05 -
Days
ISO 55001 2014 Lead Auditor (Asset Management Systems) – Lead Auditor
Muscat, Oman
13
Apr
- 05 -
Days
OSHA: Occupational Safety and Health Administration Standards
Riyadh, KSA
07
Apr
- 05 -
Days
IOSH Managing and Working Safely
Abu Dhabi, UAE
15
Dec
- 05 -
Days
The Business Analyst (PBA) - PMI Certified
Dubai, UAE
20
Jan
- 05 -
Days
Leading and Building a Positive, Motivated, and Empowered Teams
Online, Virtual
01
Sep
- 05 -
Days
Certified Business Analysis Professional- IIBA
Dubai, UAE
30
Jun
- 05 -
Days
The Risk Management Professional (PMI-RMP Exam Preparation)
Istanbul, Turkey
10
Aug
- 05 -
Days
Emotional Intelligence and Advanced Communication Skills for Leaders
Salalah, Oman
10
Nov
- 05 -
Days
Practical Negotiation Skills for Contract Management
Jeddah, KSA
24
Nov
- 03 -
Days
Happiness To Have and Hold
Dubai, UAE
18
May
- 05 -
Days
Professional in Business Analysis (PMI-PBA Exam Preparation)
Jeddah, KSA
10
Feb
- 05 -
Days
The Scheduling Professional (PMI-SP Exam Preparation)
Dubai, UAE
01
Sep
- 05 -
Days
Introduction to Machine Learning and Artificial Intelligence
Abu Dhabi, UAE
17
Feb
- 05 -
Days
Artificial Intelligence for Leaders
Abu Dhabi, UAE
14
Sep
- 05 -
Days
Competitive Bidding: Understanding Procurement Bids
Riyadh, KSA