Module Overview
This training course is designed to provide participants with a strong foundation in information security and penetration testing. Participants will learn key concepts in information security, including confidentiality, integrity, availability, and introductory cryptography, as well as practical skills to conduct penetration testing and secure industrial networks.
Topics
1. Introduction to Information Security
- Understanding Information Security Principles
- Confidentiality, Integrity, and Availability (CIA Triad)
- Basics of Cryptography
- Security Policies and Procedures
2. Penetration Testing Fundamentals
- Introduction to Penetration Testing
- Types of Penetration Testing
- Legal and Ethical Considerations
- Penetration Testing Methodology
3. Foot-printing, Scanning, and Enumeration
- Foot-printing and Reconnaissance
- Scanning Networks
- Enumeration and Information Gathering
- Tools for Foot-printing and Scanning
4. Identifying and Analyzing System Vulnerabilities
- Vulnerability Assessment
- Vulnerability Scanning Tools
- Analyzing Vulnerability Data
- Reporting and Prioritizing Vulnerabilities
5. System Security Hardening and Intrusion Detection
- Security Hardening Best Practices
- Vulnerability Remediation Techniques
- Analyzing System Logs
- Network Traffic Analysis for Intrusion Detection
Schedule
| Start Date | End Date | Days | Times |
|---|---|---|---|
| 12/15/25 | 1/5/26 | M-Su | Synchronous Online, Anytime |
| 1/15/26 | 2/15/26 | M-Su | Synchronous Online, Anytime |
| 3/1/26 | 4/1/26 | M-Su | Synchronous/Asynchronous Online, Anytime |