Have Questions? Email Us! Email: info@fojiglobaltech.com

Cyber Security Core Training

Computer, Linux, and Network Fundamentals

  • Basics of Computer
    • Installing and uninstalling applications
    • Types of web browsers and common settings (Chrome, Firefox, Edge)
    • Bookmarks and their benefits
    • Control Panel, Task Manager, etc.
  • Network Basics
    • Types of Computer Networks
    • IP addresses
    • OSI and TCP/IP Model
    • Client Server Networks
    • Common Network Protocols (HTTP, DNS, DHCP, FTP, NAT)

Cyber Security Core

  • Threat and Vulnerability Management
    • Vulnerability Management Life Cycle (Tenable Nessus, Qualys Cloud, Nmap, Snyk)
    • Vulnerability Scanning, Reporting, Prioritization, Remediation, and Verification using Qualys and Tenable Nessus
    • Qualys Virtual Appliances and Agent Deployments
  • Security Operations Center (SOC)
    • Incident Analysis and Response Life Cycle
    • Creating Phishing Email Campaigns and Cyber Security Awareness Training
    • Investigating and triaging several security incidents e.g., Bruteforce, DDOS, Malwares, Phishing Analysis, and triaging
    • Microsoft Windows Active Directory and Group Policy
    • SIEM Management (Splunk Log Ingestion, Alerts, Dashboard, Reports)
    • Splunk Universal forwarders installations on Linux and Windows Servers
  • Endpoint Detection and Response (Microsoft Defender ATP)
    • Onboarding new Defender ATP agents
    • Administering Windows Defender ATP malware policies creation and tuning
    • Offboarding Defender, ATP agents
    • Investigating Malware Incidents

Need more information? Reach out to us by sending us a message.