Cyber Security Program/FTMS/Cybersecurity Integrated Labs Workshop (CSIL)
This cybersecurity training workshop is developed by FTMS training system Limited. And industry expert EC-Council certificated trainers. It is an introduction to cybersecurity which applies the latest theoretical or practical research findings. Students will get access to all the online integrated laboratories equipped with simulation tools allowing real threat scenarios to be tested. The workshop covers most of the hot topics in cybersecurity.
Topics to be covered:
1. Phishing attacks
2. Removable media
3. Passwords and Authentication
4. Physical security
5. Mobile Device Security
6. Working Remotely
7. Public Wi-Fi
8. Social Media Security
9. Internet privacy
10. Social Engineering
11. Security at Home
13. Email attacks
14. Phone Scam
Students have to prepare the lab environment for the CSIL activities. The computer can be a laptop or desktop. It should meet the following minimum requirements:
• Intel Core i5 3.2 GHz 64-bit CPU or better (multiple cores is preferred)
• 8 GB RAM (16 GB or more isrecommended)
• 200 GB free disk space, 7200 RPM or faster drive (SSD is preferred)
• Mouse, sound card
• Internet access
• Wireless network adapter (built-in or USB)
*Students will get the lab setup guideline before the first lesson.
|#||Fee structure||Duration||Fee (HKD)||Reserve Seat||View Dates|
|1||Instructor-Led Online Delivery||6 Hours||4200||Dates|
Satendra has been involved in the IT industry for 10+ years, specialising in Network Security, Digital Forensics, Information Security Management System. He has been an integral part of our activities in the fields of design, deployment, support and training. He has created custom course outlines as well as conducting the same for a variety of high technology clients.
His work mainly focuses on conducting Ethical Hacking & Security Training, Vulnerability Assessment for FTMS's premier clients. His technical abilities span a very wide range of technologies across Network Fundamentals, Network Security, Ethical Hacking and Penetration testing.
Who should attend?
Anyone who are interested in/concerns with cybersecurity
Students with no cybersecurity background/knowledge are welcome to join.