Cyber security & Cyber Intelligence Introduction

Cyber warfare is unfortunately no longer found only in science fiction stories; it is with us today. Distributed denial-of-service (DDoS) attacks have been launched against many military and government computer systems around the world in recent years. The technological advancements in computers, software, networks and information systems in general have actually made technologically dependent countries more vulnerable to disruption. Physical security is now permanently tied to cyber security. Cyber weapons are a relatively new type of weaponry with various effects on the target.

They are usually basic scripts that have the objective to defend or attack a target. It doesn't have any limitations of use and can achieve most of the goals set. Most of them are freely available on the internet but some more sophisticated or newer ones are kept privately or are commercial. Securing infrastructure against cyber attacks has become one of every nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must be fully trained and aware of possible threats and strongly defend against a variety of threats.

The objective of this seminar is to provide practical and usable information to professionals on how to protect both infrastructure and data from the destruction of cyber terrorism and associated cyber crimes.

What you will learn:

  • Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted
  • Identify possible threats facing your organization information assets and infrastructure
  • Provide your organization with complete assessment of organizational security policy, design and implementation.
  • What are legal constraints on cyber warfare
  • Main defence strategy

Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces

Course Outline


  • Introduction to Cyber warfare & Cyber intelligence
  • Defining Cyber Vandalism
  • Critical National Infrastructure
  • Information as resources
  • Information gathering techniques and tools

Information Warfare

  • Advance information gathering and techniques
  • Network tracing, port scanning and OS fingerprint
  • Live information gathering and detecting live systems

Cyber Doctrine and Strategy

  • Setup cyber war lab
  • The digital battlefield
  • Tactical network communication system
  • Infrastructure

Cyber Weapons & Cyber Attack

  • Cross-site scripting (XSS)
  • Social engineering
  • SQL injections
  • Cookie manipulation
  • Directed Energy Weapons
  • FTP, POP3, SNMP Brute Force
  • Offline password attack
  • Rainbow Tables

Cyber Crime and Investigation

  • Introduction to cyber crime
  • What is cyber investigation
  • Handling real world investigation
  • Digital Forensics
  • Performing the Forensics Process

Computer Emergency Response Teams

  • Disaster recovery & Handling security incidents or vulnerabilities

Cyber Attack Case Study

Pre requirement

  • A fair understanding of computer and network security
  • Participants are required to bring along a Laptop for training