Courses

Home / courses

Cyber Security Program/FTMS/Cybersecurity Integrated Labs Workshop (CSIL)


This cybersecurity training workshop is developed by FTMS training system Limited. And industry expert EC-Council certificated trainers. It is an introduction to cybersecurity which applies the latest theoretical or practical research findings. Students will get access to all the online integrated laboratories equipped with simulation tools allowing real threat scenarios to be tested. The workshop covers most of the hot topics in cybersecurity.

Topics to be covered:

1. Phishing attacks 

2. Removable media 

3. Passwords and Authentication 

4. Physical security 

5. Mobile Device Security 

6. Working Remotely 

7. Public Wi-Fi 

8. Social Media Security 

9. Internet privacy 

10. Social Engineering 

11. Security at Home 

12. Viruses 

13. Email attacks 

14. Phone Scam

 

Lab Requirement

Students have to prepare the lab environment for the CSIL activities. The computer can be a laptop or desktop. It should meet the following minimum requirements: 

• Intel Core i5 3.2 GHz 64-bit CPU or better (multiple cores is preferred) 

• 8 GB RAM (16 GB or more isrecommended) 

• 200 GB free disk space, 7200 RPM or faster drive (SSD is preferred) 

• Mouse, sound card 

• Internet access 

• Wireless network adapter (built-in or USB)

*Students will get the lab setup guideline before the first lesson.

# Fee structure Duration Fee (HKD) Reserve Seat View Dates
1 Instructor-Led Online Delivery 6 Hours 4200 Dates

Trainer Introduction

Satendra has been involved in the IT industry for 10+ years, specialising in Network Security, Digital Forensics, Information Security Management System. He has been an integral part of our activities in the fields of design, deployment, support and training. He has created custom course outlines as well as conducting the same for a variety of high technology clients.

His work mainly focuses on conducting Ethical Hacking & Security Training, Vulnerability Assessment for FTMS's premier clients. His technical abilities span a very wide range of technologies across Network Fundamentals, Network Security, Ethical Hacking and Penetration testing.

Enquire Now

Thank You for Enquiry. We will get back to you shortly

 

Who should attend?

Anyone who are interested in/concerns with cybersecurity

Students with no cybersecurity background/knowledge are welcome to join.