• Best Training in Dubai
  • 24/7 Support
  • Placement Training
  • Communication Skill Training
  • Institutional Certificate
  • KHDA Certified Institution
  • 30+ Courses
  • Live Projects Training
  • Software Installation Guidance


enquire for DEMO CLASS !!!

Enquire about the Course Now !

    cyber security Course Training in dubai

    Syllabus of Cyber Security Course in Dubai:

    Syllabus :

    Introduction to OT (Operational Technology) Components:

    • Use case 1 – Water tank storage
    • Explaining the use case components
    • Explaining the use case requirements
    • What can be automated?
    • Active / Passive Components
    • Larger Scale
    • Connection of Active components
    • Data Representation & conversion
    • Data conversion with example
    • Input / Output
    • Field Devices types
    • Note to avoid confusion
    • The Control Logic
    • The Control Logic actions
    • Control Logic Cycle
    • Operation and Safety Considerations
    • Monitoring & Writing values
    • Maintenance
    • Safety Instrumented System (SIS)
    • SIS implementation
    • Data Historian

    Introduction to Distributed Control Systems (DCS) :

    • Use Case – Product Manufacturer
    • Production Phases
    • Discrete vs Process Manufacturing
    • Plant / Control
    • Distributed Control Systems
    • DCS Controllers
    • DCS Controller Programming
    • Languages Operator station (HMI)
    • DCS Layout – Eng WS

    Supervisory Control and Data Acquisition (SCADA) : 

    • SCADA main components
    • SCADA Server (MTU)
    • Programmable Logic Controller (PLC)
    • Remote Terminal Unit (RTU)
    • Programmable Automation Controller
    • (PAC) Intelligent Electronic Device (IED)
    • SCADA Alarms
    • SCADA Connections

    Operational Technology Vs Informational Technology :

    • OT Terminology
    • Terms under Operational
    • Technology IT / OT GAP
    • IT Network design
    • OT – Level 0
    • OT – Level 1
    • OT – Level 2
    • OT – Level 3
    • OT – Level 4
    • OT – Level 5
    • Purdue Reference Model
    • IT Within OT
    • Air-gapped OT networks
    • IT vs OT

    OT Communications and ProtoCols :

    • Recap on Sensors and Signals
    • Read Value
    • Write Value
    • Operational Technology Protocols by
    • Industry Introduction to Modbus
    • Modbus Communication types
    • Modbus TCP Type
    • PLC Memory Addresses
    • PLC Memory Address types and values
    • Modbus Request Format
    • Modbus RTU and RTU over TCP Format
    • Modbus TCP vs RTU
    • Modbus TCP Segment
    • Modbus Application Protocol Header
    • Modbus Protocol Data Unit (PDU)
    • Modbus TCP Request
    • Decoding Modbus TCP Request
    • Modbus Function Codes
    • How to read the RFC (Modbus)
    • LAB1: Modbus Simulator
    • LAB2: Wireshark Analysis of Modbus
    • LAB3: Connect HMI to Modbus simulator

    Operational Technology Cyber Security Controls :

    • Network Assists Discovery
    • Network Discovery (Agentless)
    • Network Discovery (Visual)
    • Endpoint Security
    • Identity and Access Management (IAM)
    • Intrusion Detection
    • NGFW and Intrusion Prevention
    • Network Access Control
    • Secure Remote Access
    • OT is insecure by design
    • OT Cybersecurity Compliance.
    Module 1: “Introduction To Cryptography”
    • Welcome
    • The information Security Field
    • InfoSec Culture
    • Career Opportunities
    • Information Security Terms
    • Cryptography and VPNs
    • Wireshark Introduction
    • Binary Arithmetic Basics
    • Bitwise Operations
    • Hexadecimal Arithmetic
    Module 2: “Networking”
    • Protocols
    • IP
    • Routing
    • Link Layer Devices and Protocols
    • TCP and UDP
    • Firewalls and Network Defenses
    • DNS
    • Wireshark
    Module 3: “Web Applications”
    • Introduction
    • HTTP Protocol Basics
    • HTTP Cookies
    • Sessions
    • Same Origin Policy
    • Burp Suite
    Module 4: “Penetration Testing”
    • Introduction
    • Lifecycle of Penetration Test
    • Engagement
    • Information Gathering
    • Foot printing and Scanning
    • Vulnerability Assessment
    • Exploitation
    • Reporting
    Module 5: “Introduction to Programming”
    • What is programming
    • Low and high-level languages
    • Programming vs. Scripting
    • Basic concepts
    • Variables
    • Functions
    • Conditional Statements
    • Loops
    • Understanding the Code
    • Conclusion
    Module 6: “Python”
    • What is python
    • Variables and types
    • Input / Output
    • Control flow
    • Lists
    • Dictionaries
    • Functions
    • Modules
    • Scripting for pen testers
    • Network sockets
    • Port scanning
    • Backdoor
    • HTTP
    • Login brute forcing
    • Python assisted hacking
    Module 7: “Command Line Scripting”
    • Bash shell
    • Bash environment
    • Bash commands and programs
    • Bash output redirectors and special characters
    • Bash conditional statements and loops
    • Windows command line
    • Windows environment
    • Windows commands and programs
    • Windows output redirectors and special characters
    • Windows conditional statements and loops
    • Information gathering
    • Introduction
    • Open-source Intelligence
    • Subdomain enumeration
    • Importance of information gathering
    Module 9: “Footprinting and scanning”
    • Mapping network
    • OS fingerprinting
    • Port Scanning
    Module 10: “Vulnerability Assessment”
    • Vulnerability assessment
    • Nessus
    Module 11: “Web Application Attacks”
    • Introduction
    • HTTP/S Protocol Basics
    • Web server fingerprinting
    • HTTP Verbs
    • Directories and file enumeration
    • Google Hacking
    • Cross Site Scripting (XSS)
    • SQL Injections
    • Encoding
    • Web application proxies
    • Other common web attacks
    • File and resource attacks
    Module 12: “System Attacks”
    • Malware
    • Viruses
    • Trojan Horses
    • Backdoors
    • Rootkits
    • Bootkits
    • Adware
    • Spyware
    • Greyware
    • Dialer
    • Keylogger
    • Bots
    • Ransomware
    • Data-stealing malware
    • Worms
    Module 13: “Password attacks”
    • Brute force algorithm
    • Brute forcing weaknesses
    • John the Ripper
    • Dictionary attacks
    • Hashcat
    • Conclusion
    Module 14: “Buffer Overflow Attacks”
    • Buffers
    • Stack
    • The stack in applications
    • How buffer overflow attacks work
    Module 15: “Network Attacks”
    • Authenticating Cracking
    • Brute force vs. Dictionary Attacks
    • Weak and default credentials
    • Authentication cracking tools
    • Hydra
    Module 16: “Windows shares”
    • NetBIOS
    • Shares
    • UNC Paths
    • Administrative shares
    • Badly configured shares
    Module 17: “Null Sessions”
    • Enumerating windows shares
    • Checking for Null Sessions
    • Exploiting Null sessions
    • About null sessions
    Module 18: “ARP Poisoning”
    • ARP poisoning actors
    • Gratuitous ARP replies
    • Forwarding and mangling packets
    • Local to remote Man in the Middle
    • Dsniff Arpspoof
    Module 19: “Metasploit”
    • MSFConsole
    • Identifying a vulnerable service
    • Searching
    • Configuring an exploit
    • Configuring a payload
    • Running an exploit
    Module 20: “Meterpreter”
    • Bind and reverse
    • Launching meterpreter
    • Sessions
    • Information gathering with meterpreter
    • Privilege escalation
    • Dumping the password database
    • Exploring the victim system
    • Uploading and downloading files
    • Running OS Shell
    • Beyond Remote Code Execution
    Module 21: “Forensic Investigation”
    • Computer Forensics Today
    • Computer Forensics Investigation Process
    • Hard Disks & File Systems
    • Data Acquisition
    • Anti-Forensics Techniques
    • Operating System Forensics
    • Network Forensics
    • Web Attack Investigation
    • Database Forensics
    • Forensics with the Cloud
    • Malware
    • Email Investigation
    • Mobile
    • Forensic Reporting
    • Course Summary

    Benefits of Cyber Security Course in Dubai:

    • Cyber Security Course in Dubai by our trained experts
    • You will get both Institutional Certificate and the KHDA Certificate
    • Spoton provides you the facility to schedule the classes according to your availability
    • You will get Cyber securitystudy materials to study further.

    why should you choose spoton

    Trained by Experts
    Cooperate Project Training
    Career Guidance

    student testimonials

    Google Verified Reviews

    I recently completed my Interior designing softwares and it was an amazing experience. I studied AutoCad, Revit and SketchUp here. The time schedule was really flexible. I had two tutors and one of them was Sarath sir, he was very helpful and improved me a lot in software skills and as well as other professional skills. And to specially mention, all the tutors and staffs were friendly and supportive. There are many other courses in this institute and I strongly recommend to try those here.

    Firoz Bin Saif
    Student, Spoton Institute

    I just completed my VAT course at the Spoton training institute. I was new to Dubai and was a little scared to explore and learn new things but my trainer made it very easy, he made the course interesting and delivered it simply. If any doubt arrives in the class he will clear that doubt with some examples from his work experience so that I can understand easily. I got more knowledge from this class, so I thank spoton institute.

    Aleena Shaji
    Student, Spoton Institute

    My experience working with Spoton has been nothing but incredible. I was always presented with opportunities to learn and grow professionally and personally with regard to my field in Cybersecurity. It is a blessing to form relationships and work with gifted and intelligent individuals who are just as passionate about what they do as I am. Spoton is definitely a great company, and I hope to do more work with them in the future.

    Suzanne Peiris
    Student, Spoton Institute

    I had a fantastic experience with the fashion designing course at Spoton Training Institute . The curriculum covered a diverse range of topics, including fashion digital illustration, fashion draping, garment construction, and pattern making. Ayana, our trainer, was exceptional, providing thorough guidance and expertise. The classes were engaging, and the overall atmosphere was conducive to learning. I highly recommend this institute for anyone looking to pursue a comprehensive and hands-on fashion design education.

    Shalu Singh
    Student, Spoton Institute

    I recently completed the VAT course at SpotOn, taking online classes . I’m pleased to say it was an excellent experience. Jiss Thomas’s was my trainer and his teaching was comprehensive, making complex topics easy to grasp. The online platform was user-friendly, ensuring a smooth learning process. I highly recommend SpotOn for their VAT course, especially for the convenience of online learning and the expertise of trainers like Jiss Thomas.

    Vidhya MV
    Student, Spoton Institute

    enquire about cyber security course!!!

    Enquire about the Course Now !