Nowadays, many attackers launch cyberattack and many companies suffer from. Design and implement a secure system become an essential skill for an IT practitioner. In this course, you will learn the basics of cybersecurity, different system attack method and how to design / implement a secure system in a hands-on approach.
Target Audience
Those who are interested to learn cybersecurity and ethical hacking
Prerequisite
To get most out of the course, participants are expected to have basics of computer and Internet. No programming skills are required. We will start from scratch.
Course objective
To conduct risk assessment to determine the critical part of an information system
To recognize the different attack methods related to the information system and the working mechanism behind the attack methods
To evaluate and select appropriate security controls to protect the information system
With over 12 years of solid experience in information technology, information security and audit, Leo has been working as an information technology consultant responsible for conducting security risk assessment, designing security controls and conducting information technology audit. Moreover, he has taught information security courses in various tertiary education institutes including IVE, SHAPE and HKUSPACE. Leo also conducts seminars and in-house training for various organisations and government sectors.