“Information and cyber security” - course 30,000 rubles. from MSU, training 3 weeks. (1 month), Date: December 1, 2023.
Miscellaneous / / December 04, 2023
The refresher course is aimed at studying knowledge and acquiring skills to provide information security both at the corporate level and within the framework of personal use of devices with access to Internet.
The following topics are studied in the program:
- Studying the theoretical foundations of information and cyber security;
- Analysis of major cyber threats;
- Analysis of current legislation in the context of cybersecurity;
- Introduction to the Linux operating system. Kali Linux version;
- Modeling the situation of an attack on a device and solving the problem (cases).
Duration of training – 36 hours (24 hours of classroom lessons with a teacher, 12 hours of independent study of materials).
Form of study – full-time and part-time, without interruption from work, classes begin on weekdays at 18:30, on Saturdays at 10:00.
Class format - full-time, for participants from other cities, and if it is impossible to attend in person, you will be able to connect to the lesson via video conference.
Cost of education in the 2022/2023 academic year - 30,000 rubles.
Start of classes - autumn 2023.
Training agreements are concluded with individuals and legal entities.
Registration for courses is carried out by email [email protected] (for individuals), [email protected] (for legal entities) or through the registration form on the website. You can also contact the course administrator, Anton Martyanov, to register or with questions via WhatsApp or Telegram at +79264827721.
Faculty dean's phone number: +74959328073
1. Information Security Basics
Basic Definitions
Features and properties of information
Classification of information products, resources and services
2. Legislative framework for ensuring information and cyber security
Basic Federal Laws on Information Security
Basics of information security when working with the media
3. Information security threats: safe use of devices and the Internet.
Types of viruses
Antiviruses
VPN and Proxy
Secure work with the Internet (dns, domains, hosting, IP, data exchange protocol, cookies and cache)
4. Virology
Standard infection methods
Signs of infection
A Brief Overview of Viruses
4. “Ethical” hacking
What is hacking?
Characteristics of Hacking
Work in Hackthebox, Crypto-kids programs
Phishing using real examples
5. Hardware and software devices to ensure corporate information security
SIEM systems
Classification of security threats to corporate networks
Case studies: real examples of cyber attacks
Address
119991, Moscow, st. Leninskie Gory, 1, bldg. 51, 5th floor, room 544 (Dean's office)
University