Training for a Career in Cybersecurity

 

Securing, protecting, and defending our nation’s cybersecurity data and infrastructure requires a responsive, extensive, and highly trained workforce.

Mac Jason Academy is the place to start for all people interested in advancing their cybersecurity education: current cybersecurity employees looking to build skills, career changers seeking to forge a new path or veterans hoping to retrain for the next phase in life.

Our most popular Cyber security and hacking training covers the techniques used by malicious, black hat hackers with high energy lectures and hands-on lab exercises.

CISM – CISSP – CEH

Cyber Security - Mac Jason Academy - Certification Magazine

According to Certification Magazine, out of the top 12 cyber security certifications mentioned, the ISACA CISM and the (ISC)2 CISSP certifications are the top two. The EC-Council Certified Ethical Hacker (CEH) is within the top 10.

All 3 certifications attribute to the highest average salary of security professionals, ranging from $97,000 – $127,063.

We now provide training for all CISM, CISSP, and CEH modules. Our certified trainers possess a combined industry experience of over 40 years.

The course curriculum has been carefully designed based on industry experience and it is constantly updated to reflect the constant innovations in the IT field and adjusted to the global job market expectations.

Cyber Security Essentials – Level I Course

Course Objective

This course is designed to provide a basic, but working understanding of Cyber-Security.  The students will learn about their roles in cyber security to enable them to do their jobs more effectively, as well as learn about cyber security threats. Finally, the students will also learn how not to become victims of cyber threats at home,and how to avoid being used indirectly to perpetuate cyber-attacks against their organizations.

  1. Building blocks of Security
    1. Protocols
      1. UDP
      2. TCP/IP
      3. ICMP
  1. TCP/IP Deeper Dive – The OSI Model Layers and TCP/IP Layers)
    1. The OSI Model Layers
      1. Application Layer
      2. Host to Host Transport Layer
      3. Internet Layer
      4. Network Interface Layer
    2. The 7 Layers of TCP/IP (Probably Don’t Need These Silly Protocols Anyway)
      1. Application Layer
      2. Presentation Layer
      3. Session Layer
      4. Transport Layer
      5. Network Layer
      6. Data Layer
      7. Physical Layer
  2. Putting It Together
    1. Network
      1. LANs
      2. WANs
      3. Cloud
  1. Switches – Data Layer
  2. Routers – Network Layer
  3. Perimeter Security
    1. Firewalls
      1. Packets
      2. Traffic
      3. zones
      4. Stateful Inspection
      5. Content filtering
      6. URL filtering
      7. Deep Packet Inspection
      8. Submitting a firewall request
    2. Intrusion Detection Systems (IDS)
    3. Intrusion Prevention Systems (IPS)
    4. Next Generation Firewalls
  1. AAA
    1. Authentication
      1. Single-factor authentication
      2. Multi-factor authentication
    2. Authorization
    3. Accounting

4. Cryptography/PKI

  • Data Encryption
    1. Certificates
  • Digital Signatures
    1. Hash

5. Identity Federation

  • What is it?
  • How is it used?
  • Benefits

6. DNS (Domain Name Service)

  • Can be configured to help protect the organization

7. Directory Services – X.509

  • LDAP
  • Active Directory (AD)
    1. Domain Controllers
  • Importance of directory services in an organization

8. Cyber-Threats

  • System security vulnerabilities vs Application security vulnerabilities
  • Social Engineering
    1. Exploits behavioral tendencies (Willingness to help; Respect for authority)
    2. Targets social media (Facebook, LinkedIn, Twitter)
  • Hacking web servers
  • Hacking websites
  • Denial of Service Attack (DOS)
  • System Hacking
  • Viruses & Worms
  • Trojan Horse
  • Phishing Email Attacks
  • Spear phishing Attacks

9. Preventing Phishing Email Attacks

  • Check the “From” Address
  • Think before your click
  • Do not engage in chain emailing

10. The Weakest Link

  • Separate your private online life from your corporate life

11. Patching and updating your systems

12. Backup

13. Q&A

Cyber Security – Level II Course 

Course Objective:

  • This course is designed to provide student with the knowledge and resources needed to begin a career in IT Security. After attending this course, the student should have a better understanding and applicability of the three main anchors or domains of information security – Confidentiality, Integrity, and Availability.

In the interactive, lab-filled environment of this Cyber Security course, students will gain in-depth knowledge and practical experience with current, essential security systems.

Students will learn how perimeter defenses work and become proficient in the use of network security tools and techniques needed to enhance a network’s defenses. The student should be able to understand the importance of risk management, and recognize the most common threat factors.

After completing this course, the students will have a clearer sense of the right professional certification exams or courses to take in order to propel his or her career in IT Security.