Tactical Cybersecurity Skills

16 hours
Request Training Proposal

Course Contents

In this intermediate 16-hour course, students with a foundational understanding of cybersecurity will delve into more advanced defense tactics. Covering topics like network security, cryptography, and ethical hacking, the course emphasizes hands-on learning with simulations and lab exercises. Students will engage in real-world scenarios, enhancing their ability to secure systems and understand the attacker's perspective.

- Network Security

  - Understanding network protocols and defenses

  - Configuring and managing firewalls

  - Basics of secure network design

- Cryptography

  - Introduction to encryption and decryption

  - Public and private key cryptography

  - Digital signatures and SSL certificates

- Ethical Hacking and Penetration Testing

  - Introduction to ethical hacking

  - Basics of penetration testing and vulnerability assessment

  - Ethical hacking tools and techniques

- Practical Labs

  - Setting up a secure home network

  - Performing basic penetration testing on a test network

  - Encrypting email communications

Instructor Profile


StepUpwards is a workplace learning platform

This course includes:

  • 100% Online Sessions
  • Instructor led
  • Customizable Syllabus
  • Customizable Schedule
  • Certificate of Completion
  • Training Recordings
  • Training Resources
  • Learner Assessment
Request Training Proposal

StepUpwards Training Requirement Form

Please complete this form so we can get back to you with a training proposal.

By clicking "Submit", you agree to our Terms of Use , Privacy Policy and Service Agreement

Individuals younger than 18 years of age, but of the required age for consent to use online services, as per applicable law in their country of residence may set up an account and enroll in appropriate courses through their parent or guardian. Individuals younger than the required age for consent to use online services may not use the Services offered by StepUpwards Platform. For more details, please refer to our Privacy Policy.