Intro to Cyber
Step into the dynamic realm of cybersecurity and build a strong foundation in digital defense. This introductory course is designed for beginners, offering a clear and accessible path to understanding networking and security essentials.
Explore fundamental network concepts and gain the knowledge needed to navigate and safeguard today’s interconnected digital landscapes. Perfect for those starting their journey, this course lays the groundwork for future growth in the field of cybersecurity.
Program Code: XE101
Package: XE Basics​
Level: 1



Course Information

Prerequisites
-
Basic Computer Skills​

Duration Options
-
Self-paced: 2-4 week
-
Trainer-led: 16 hours
Core Features of Cyberium Arena
Labs
Enhance training with defense and attack tasks.
Books
Tailored coursebooks for cybersecurity studies.
Scenarios
Diverse situations mimicking real professional challenges.
Projects
Integrated projects to demonstrate acquired knowledge.
Digital Communication Basics
Digital Sizes and Binary
Understand how computers represent data using binary. Learn about bits, bytes, and larger units of digital information.
IP Addresses
Explore the addressing system of the internet. Differentiate between private, public, and general IP addresses.
Network Services
Discover common protocols like HTTP and FTP. Learn about DNS for domain name resolution and DHCP for IP assignment.


Network Security Tools
Shodan
Learn to use this powerful search engine for internet-connected devices. Discover potential security vulnerabilities in networks.
Google Dorks
Master advanced search techniques to find sensitive information online. Understand the implications for cybersecurity
Hashing
Explore various hash functions and their applications in cybersecurity. Learn about data integrity and password storage
Data Encoding Techniques



Hexadecimal
The base-16 number system used extensively in cybersecurity for color codes, memory addresses, and malware analysis. Each digit represents 4 bits of data.
Base64
Binary-to-text encoding scheme essential for web security, commonly used in email attachments, web tokens, and secure data transmission protocols.
ASCII/Unicode
Character encoding standards that define how computers represent text, crucial for converting between formats and understanding text-based vulnerabilities.

Network Traffic Analysis
1
Command Prompt Basics
Learn essential networking commands like ping and tracert. Understand how to troubleshoot network issues.
2
Wireshark Introduction
Explore this powerful packet analyzer. Capture and examine network traffic in real-time.
3
Advanced Wireshark Techniques
Master Wireshark filters and statistics. Gain insights into network behavior and potential security threats.

Network Models
OSI Model
7 layers​
Theoretical approach
Separates functions of each layer
TCP/IP Model
4 layers​
Practical implementation
Combines application, presentation, and session layers

Hands-on Learning

Practical Exercises
Apply theoretical knowledge through hands-on labs. Practice using real cybersecurity tools and techniques

Collaborative Learning
Engage in group projects and discussions. Share insights and learn from peers' experiences

Skills Assessmen
Demonstrate your newfound knowledge through quizzes and practical tests. Earn a certificate of completion.