STEP IT STEP | We have been teaching since 1999. High-quality IT-education for adults and children. We prepare programmers, designers and system engineers who cannot be replaced by artificial intelligence. In order to achieve this, we teach how to understand tasks, run projects and work in a team, in addition to core knowledge.
Your browser Internet Explorer is out of date!
Please, use Google Chrome, Safari, Mozilla Firefox, Opera
Analyze logs and detect anomalies
Investigate cybersecurity incidents
Use SIEM systems and monitoring tools
Work with Linux, Windows, networks, and virtual machines
Assess vulnerabilities and manage risks
Configure ACLs, VPNs, and work with cryptography & PKI infrastructure
Respond to incidents and create professional reports
Understand how SOCs operate and how companies build security
Prepare for the Cisco CyberOps Associate certification
Module 1 – Introduction to Cybersecurity
Module 2 – Fighters in the War Against Cybercrime
Module 3 – Windows Operating System
Module 4 – Linux Operating System
Module 5 – Network Protocols
Module 6 – Ethernet and Internet Protocol (IP)
Module 7 – Connection checking
Module 8 – ARP Protocol
Module 9 – Transport Layer
Module 10 – Network Services
Module 11 – Network Devices
Module 12 – Network Security Infrastructure
Module 13 – Attackers and their tools
Module 14 – Common Threats and Attacks
Module 15 – Network Monitoring Tools
Module 16 – Fundamentals of Attack Defense
Module 17 – Access Control
Module 18 – Threat Scanning
Module 19 – Introduction to Cryptography
Module 20 – Protecting Workstations and Servers
Module 21 – Vulnerability Assessment of Workstations and Servers
Module 22 – Technologies and Protocols
Module 23 – Network Security Data
Module 24 – Alert Evaluation
Module 25 – Working with Network Security Data
Module 26 – Digital Forensics, Analysis and Incident Response
Leave a request - we will call you,answer your questions and reserve a place for you in the group