Feva Works IT Education Centre

Certificate in Cybersecurity

Enquire Now

Course Information

Schedules
  • 25 Jul 2024 (Thu) - 26 Sep 2024 (Thu) 7:00 PM - 10:00 PM
  • 26 Jul 2024 (Fri) - 27 Sep 2024 (Fri) 7:00 PM - 10:00 PM
Registration period
17 Jun 2024 (Mon) - 25 Jul 2024 (Thu)
Price
HKD 7,000
Course Level
Study Mode
Duration
30 Hour(s)
Language
Cantonese
Location
北角英皇道335-341號恆生北角大廈 2 樓 / 長沙灣分校 / 網上 Online Live
11 views

Course Overview

 

在當今的數碼化時代,企業的數碼資產和數據已經成為最重要的商業資產之一。

然而,這些資產也面臨著日益增長的威脅。網絡攻擊、數據泄露、勒索軟件等各種安全事件都可能對企業造成嚴重的損失,包括財務損失、聲譽損失和法律風險等。因此,保護企業的數字資產已經成為企業必須面臨的重要挑戰之一。

這就是為什麼Cybersecurity的重要性變得越來越大。

Cybersecurity是指保護網絡、電腦系統、移動設備和數據等數碼資產免受未經授權的訪問、使用、修改、破壞或盜竊的技術、措施和實踐。

簡單來說,Cybersecurity是一個企業保護其數碼資產的綜合策略和實踐。

Cybersecurity的重要性:

保護企業數碼資產:企業的數碼資產包括客戶數據、財務數據、業務機密等重要資訊,這些資產是企業成功的基礎。Cybersecurity可以保護這些數字資產免受未經授權的訪問和使用。

避免財務損失:網絡攻擊和數據泄露可能導致企業的財務損失,包括賠償、補救措施和法律費用等。Cybersecurity可以幫助企業減少這些損失。

保護企業聲譽:安全事件可能對企業聲譽造成嚴重的損害,進而影響企業的商業運營和發展。Cybersecurity可以保護企業聲譽免受損害。

提高客戶信任度:客戶對企業的信任是企業成功的基礎之一。Cybersecurity可以保護客戶數據和隱私,提高客戶對企業的信任度。

Cybersecurity已經成為企業不可或缺的一部分。保護企業的數碼資產和數據不僅是企業的責任,也是保護客戶利益和維護商業道德的必要措施。

因此,企業應該重視Cybersecurity,制定相應的策略和措施,以減少安全風險和保護企業的數碼資產。

 

 

 

What You’ll Learn


Module 1: Introduction to Cybersecurity

  • Ethical issue in Cybersecurity
  • Cybercrime Landscape and Threats
  • Cybersecurity Frameworks and Standards Overview
  • Common cyber-attack types
     

Module 2: Cryptography

  • Authentication Protocols and Techniques
  • Cryptographic Algorithms and hacking

 

Module 3: Vulnerability Assessment and Management

  • Common Vulnerabilities, types (CVSS scoring)
  • Vulnerability Scanning tools
  • Vulnerabilities Managements
     

Module 4: Website Hacking Techniques

  • OWASP framework
  • Advanced Website Hacking Techniques and Tools

 

Module 5: Website Protection Strategies

  • Website Protection Best Practices and Tools for Cybersecurity Defense
  • Web Application Firewall (WAF) and Reverse Proxy for Website Protection

 

Module 6: Malware and Botnets

  • Malware Types, Characteristics, and Prevention Techniques
  • Botnets and their Impact on Cybersecurity
  • Botnet exercise
  • Anti-Malware Tools and Techniques for Cybersecurity Defense

 

Module 7: Enterprise Infrastructure Protection (I)

  • Metasploit Framework and Penetration Testing
  • Port Security and Network Access Control for Enterprise Security
  • Firewall Technologies and Configurations for Cybersecurity Defense
  • DHCP and DNS Spoofing Attacks Prevention Techniques
  • Certification Authority and Public Key Infrastructure in Cybersecurity Management

 

Module 8: Enterprise Infrastructure Protection (II)

  • Accounts Authentication and Authorization for Enterprise Security
  • Active Directory Security and Group Policy Management Best Practices
  • x.509 Certificates and Secure Communication for Cybersecurity Defense

 

Module 9: Cloud Security

  • DDoS Attacks and Mitigation Techniques for Cloud Security
  • Identity and Access Management (IAM) for Cloud Cybersecurity
  • Cloud-Based WAF and Security Services for Cloud Security Management

 

Module 10: Operating System Hardening Guides

  • Windows Security Hardening Best Practices and Guidelines for Cybersecurity Defense

 

Note: The course outline is subject to change based on the needs and requirements of the students and the latest updates in the market.

 


 



Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed