Cyber Security Fundamentals – FIFO Networks


Course Length:  The class is typically 18 to 24 hours. All of the following formats have been used:

  1. Three straight days, morning and afternoon
  2. Five 4-hour classes
  3. Seven 3-hour classes

Prerequisites:  Basic computer skills and familiarity with Windows.

Course Objectives:  Identify and block attacks in this course that provides plenty of hands-on experience in addition to practical instruction.

Topics include: information security, types of attackers, more than you ever knew about passwords, how social engineering attacks really work, defense strategies for email, social networks, and financial accounts, recognizing and defending against different types of malware,  what to do before, during, and after an attack, dissecting an email attack, web attacks and server attacks, “ICE”ing web browsers, wireless network attacks, mobile device attacks, attacking and defending routers and printers, optimizing antivirus software, and computer forensics.


Download Course Outline :  Cybersecurity Fundamentals

Agenda (each session includes hands-on lab activities)

  • Session 1
    • Vocabulary and concepts: security, types of attacks, types of attackers, security strategy. Create fake accounts.
  • Session 2
    • Password hacks and security, social engineering. Identity theft techniques. Social networking attacks and defense.
  • Session 3
    • Types of malware, installation methods, discovering malware, removing malware, preventing malware. Computer security, antivirus tricks, backups, recovering from an attack.
  • Session 4
    • Web and Internet attacks, email and browser attacks, defense and recovery. Create fake websites and email attacks. Encryption and decryption methods.

  • Session 5
    • Mobile and wireless security. Phone and tablet attacks. Attack laptops wirelessly. Secure phones, tablets, and laptops. Attack wireless routers. Create fake wireless access points.
  • Session 6
    • Business network security. Attacks on printers and routers. Physical security. Access control.
  • Session 7
    • Computer forensics. Log files. Disaster recovery.
  • Session 8
    • “War Games.” Students attack each other’s computers while defending their own, using methods learned in class. (Controlled and harmless. The computers can immediately be returned to service.)