learning path

Cyber Primer

Beginner
Up to 2h 9m
1,606
4.6/5
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

Course Overview

The QA Cyber Primer program aims to introduce the learner to the world of Information and Cyber Security. The course takes the learner through the eyes of an adversary – someone trying to infiltrate a computer's security using some of the steps of the Cyber Kill Chain, and showcases some real-world examples of the chain in-action. The learner first sees the theory and examples of how certain methods of the kill chain work, and can then view them in-action in software simulations.  

The course starts by taking the learner through the basics of cyber security. This includes some of the terminology used, such as the different types of adversaries, and the 8 stages of the Cyber Kill Chain. There are two simulation videos that introduce the learner to some of the basic software used in Cyber Security.  

It then moves on to looking at reconnaissance: how a target is scoped. It looks at how popular software and websites can be used, and shows 3 simulation videos of reconnaissance tools.  

Then the program looks at the weaponization stage: how malware can be created to be utilized against a target. This is followed by simulations of some simple Mobile and Desktop malware creation.  

The final part looks at delivery of the payloads created in the previous module. This is then followed by the simulation of payload delivery. 

Please note: this content was produced in the UK and may include the use of British English.

Intended Audience

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.  

Prerequisites of the Certifications

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet. 

 

Learning Objectives

The Cyber Primer course covers the following areas:  

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems 
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Reconnaissance  
  • Social Engineering  
  • Weaponization 
  • Obfuscation 
  • Encryption   
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Obfuscation  
  • Payload Delivery Methods  
  • Exfiltration  

Feedback 

We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.  

Agenda

This Course contains videos, software simulations, and other resources for four courses.  

Course Introduction

We begin with an introduction to the course and what you can expect from the videos in this Course.  

Module 1 – Understanding Cyber Security

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems 
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Installing Virtualbox 
  • Installing Kali Linux 

Module 2 – Reconnaissance

  • Reconnaissance  
  • Social Engineering  
  • Twitter Profiling  
  • Google Hacking  
  • Maltego  

Module 3 – Weaponization

  • Weaponization 
  • Obfuscation 
  • Encryption   
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Windows App Malware Creation  
  • Mobile Malware Creation  

Module 4 – Payload Delivery 

  • Payload Delivery Methods  
  • Exfiltration  
  • Pivot Networks  

 

Your certificate for this learning path
QA
This content is developed in partnership with QA
Learn more

About the Author

Avatar
King Samuel, opens in a new tab
Cyber Security Trainer
Students
9,728
Courses
12
Learning paths
10

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics