Technical >> General Engineering

Cybersecurity Attack and Defense Fundamentals​

TG148

Location

Duration

Date

Fee inclusive of VAT

Riyadh
5 Days
12-10-2025
17,250 (SAR)

Course Overview

This course equips IT and cybersecurity professionals with essential knowledge and skills to identify, prevent, and respond to modern cyber threats. As organizations increasingly depend on complex digital infrastructures, this training provides a vital foundation in ethical hacking, network defense, and digital forensics. Participants will explore common vulnerabilities and attack methods while developing the ability to implement effective countermeasures and forensic investigations.

Course Objective

  • Understand key cybersecurity concepts, threats, and vulnerabilities
  • Identify and respond to network-level and application-level attacks
  • Apply network and digital forensics techniques for incident analysis
  • Implement secure authentication, authorization, and cryptographic methods
  • Evaluate and strengthen wireless network security

Who Should Attend?

  • Cybersecurity Analysts
  • Information Security Officers
  • IT Administrators
  • Network Engineers

Course Outline

Module 1: Introduction to Cybersecurity and Ethical Hacking

  • Ethical hacking essentials
  • Information security principles
  • Common threats and vulnerabilities

Module 2: Network-Level Attacks

  • Sniffing and eavesdropping techniques
  • Denial-of-Service (DoS) attacks
  • Session hijacking fundamentals

Module 3: Application-Level Attacks

  • OWASP Top 10 overview
  • SQL injection and webserver exploitation
  • Application vulnerability management

Module 4: Wireless Network Security

  • Fundamentals of wireless networking
  • Wireless encryption types
  • Securing wireless communications

Module 5: Identification and Authentication

  • Authentication and authorization concepts
  • Secure identification techniques
  • Overview of access control systems

Module 6: Cryptographic Techniques

  • Symmetric vs. asymmetric encryption
  • Cryptographic algorithms and applications
  • Public Key Infrastructure (PKI)

Module 7: Network Forensics

  • Fundamentals of network forensics
  • Event correlation and traffic analysis
  • Tools for forensic investigation

Module 8: Digital Forensics Essentials

  • Digital evidence and data acquisition
  • Forensics investigation phases
  • Reporting and legal considerations

Module 9: Case Studies in Cyber Defense

  • Real-world attack scenarios
  • Incident response simulations
  • Lessons learned from breaches

Module 10: Final Assessment and Review

  • Knowledge quiz and final exam
  • Group discussion on key takeaways
  • Feedback and course wrap-up

Training Methodology

The course combines various teaching methods, including instructor-led presentations, group discussions, case study analyses, and assessments through quizzes and a final exam to engage participants and ensure they understand and retain the material.

Terms & Conditions

ACTrain reserves the right to alter the Course Schedule without Prior Notification, Fees Quoted are Subject to Terms & Conditions Outlined in ACTrain's Registration Policy

Upcoming Courses

Cathodic Protection

This intermediate-level course is tailored for professionals tasked w

Read more

Maintenance & Reliability Professional

Lower revenues due to lower commodity prices have placed equipment li

Read more

Reliability Centered Maintenance

The participant will understand the history, the benefits, and the fu

Read more

Maintenance & Reliability Professional

Lower revenues due to lower commodity prices have placed equipment li

Read more

Commissioning And Startup

This course provides a foundational understanding of commissioning an

Read more

Optimizing Equipment Maintenance & Rep

In this course you will be able to optimizing equipment Maintenance a

Read more

Optimizing Equipment Maintenance & Rep

In this course you will be able to optimizing equipment Maintenance a

Read more

Optimizing Equipment Maintenance & Rep

In this course you will be able to optimizing equipment Maintenance a

Read more