Training content
Course Overview
The QA Cyber Primer program aims to introduce the learner to the world of Information and Cyber Security. The course takes the learner through the eyes of an adversary – someone trying to infiltrate a computer's security using some of the steps of the Cyber Kill Chain, and showcases some real-world examples of the chain in-action. The learner first sees the theory and examples of how certain methods of the kill chain work, and can then view them in-action in software simulations.
The course starts by taking the learner through the basics of cyber security. This includes some of the terminology used, such as the different types of adversaries, and the 8 stages of the Cyber Kill Chain. There are two simulation videos that introduce the learner to some of the basic software used in Cyber Security.
It then moves on to looking at reconnaissance: how a target is scoped. It looks at how popular software and websites can be used, and shows 3 simulation videos of reconnaissance tools.
Then the program looks at the weaponization stage: how malware can be created to be utilized against a target. This is followed by simulations of some simple Mobile and Desktop malware creation.
The final part looks at delivery of the payloads created in the previous module. This is then followed by the simulation of payload delivery.
Please note: this content was produced in the UK and may include the use of British English.
Intended Audience
Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.
Prerequisites of the Certifications
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
Learning Objectives
The Cyber Primer course covers the following areas:
- Cyber Security
- Prevent, Detect, Respond
- The CIA Triad
- ISMS: Information Security Management Systems
- Threat Actors
- The Cyber-Kill Chain
- Attack Surfaces
- Reconnaissance
- Social Engineering
- Weaponization
- Obfuscation
- Encryption
- Ciphers
- Desktop Malware
- Mobile Malware
- Obfuscation
- Payload Delivery Methods
- Exfiltration
Feedback
We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.
Agenda
This Course contains videos, software simulations, and other resources for four courses.
Course Introduction
We begin with an introduction to the course and what you can expect from the videos in this Course.
Module 1 – Understanding Cyber Security
- Cyber Security
- Prevent, Detect, Respond
- The CIA Triad
- ISMS: Information Security Management Systems
- Threat Actors
- The Cyber-Kill Chain
- Attack Surfaces
- Installing Virtualbox
- Installing Kali Linux
Module 2 – Reconnaissance
- Reconnaissance
- Social Engineering
- Twitter Profiling
- Google Hacking
- Maltego
Module 3 – Weaponization
- Weaponization
- Obfuscation
- Encryption
- Ciphers
- Desktop Malware
- Mobile Malware
- Windows App Malware Creation
- Mobile Malware Creation
Module 4 – Payload Delivery
- Payload Delivery Methods
- Exfiltration
- Pivot Networks
About the Author
Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.