Competency

Techniques of Cybersecurity

This competency provides a comprehensive understanding of essential cybersecurity practices, covering attack methods, protective measures, and cryptography principles.

5 Trainers

About

Course Overview:

With a focus on real-world applications, this course will guide participants through various attack mechanisms, security controls, and cryptographic solutions. Through practical examples, participants will gain the knowledge needed to assess vulnerabilities, implement effective security measures, and understand the importance of cryptography in securing data.

What You'll Learn:

  • Attack mechanisms and internal/external threats
  • Security controls including application-level, server, and client-level controls
  • Techniques for managing access controls (Identification, Authorization, Authentication, Accountability)
  • Key concepts of cryptography including symmetric and asymmetric encryption, hybrid systems, and key management

Who Should Take This Course?

This course is perfect for:

  • Cybersecurity professionals
  • IT security managers
  • Data protection officers
  • Security consultants
  • Compliance officers
  • IT professionals interested in cybersecurity

What You'll Get:

  • Certification of completion
  • Practical knowledge of cybersecurity attack mechanisms and defense strategies
  • Access to course materials
  • Hands-on experience with cryptographic techniques and access control mechanisms

Module 1

Attack Mechanisms

  • Attacks from Inside the Private Network: 13 mins
  • Internal and External Attacks: 14 mins
  • Types of Cyberattacks: 13 mins
  • Mitigation of Internal and External Attacks: 13 mins
  • Take the Practice Quiz

Module 2

Cybersecurity Controls

  • Application-level Controls: 15 mins
  • Server Protection: 14 mins
  • Client-level Service Authentication: 15 mins
  • Controls against Social Engineering Attacks: 14 mins
  • Take the Practice Quiz

Module 3

Access Controls

  • Identification: 16 mins
  • Authorization: 14 mins
  • Authentication: 15 mins
  • Accountability: 13 mins
  • Take the Practice Quiz

Module 4

Cryptography

  • Symmetric Cryptography: 13 mins
  • Asymmetric Cryptography: 15 mins
  • Hybrid Systems: 13 mins
  • Key Management: 16 mins
  • Take the Practice Quiz

Specialization · 4 modules             

4 Modules

100% Positive Reviews (24 reviews)

104 Lessons (4h 15m)

3,011 Students

Languages Available: Spanish, English, German, French

Exam

Certificate upon completion of the course

Tags

Cybersecurity

Techniques for Cybersecurity

Data Protection

Cybersecurity Controls

Cryptography

Cyber Incident Response

Cybersecurity Standards

About the Trainer

Algis Kibirkstis

Cybersecurity and Information Security Advisor

Algis Kibirkstis stands out as an expert in information security, highly regarded for his proficiency as an ISO/IEC 27001, CISSP, and CISA trainer. Fluent in English and French, his communication skills reflect his international exposure and dual nationality (Canadian and Lithuanian/EU). With a career spanning over thirty years, Algis has dedicated more than two decades to information security. Algis has deep insights into ISO/IEC 27001 governance, risk management, audit, and compliance, earning recognition as a leading specialist. As a freelancer, Algis is interested in contractual opportunities, using his experience to support organizations in meeting their information security goals.

Get Industry Insights and Special Offers

Skills Subscribes

© PECB Skills 2025. All rights reserved.

Book a Meeting

Skills - Book a demo

登録ありがとうございます!

Thank you for subscribing!