Cyber Security Fundamentals – FIFO Networks

Instructor Bio

Bob Young started his career with six years in the US Navy, where he held a Secret clearance for crypto-electronics. Later, he served as the Training Manager for Engineering and Operations at Western Wireless (Cellular One). Mr. Young developed and delivered a webinar on Wireless Security to an international audience at the request of the Global Wireless Education Consortium (GWEC). Currently, Bob is the owner of FIFO Networks in Lincoln City, Oregon. Mr. Young provides design consulting and training to the engineers and technicians at wireless companies and public utilities around the country on specialized topics including advanced network protocols, security, network architecture, and data transmission.

Course Summary

Identify and block attacks in this course that provides plenty of hands-on experience in addition to practical instruction.

Topics include: information security, types of attackers, more than you ever knew about passwords, how social engineering attacks really work, defense strategies for email, social networks, and financial accounts, recognizing and defending against different types of malware,  what to do before, during, and after an attack, dissecting an email attack, web attacks and server attacks, “ICE”ing web browsers, wireless network attacks, mobile device attacks, attacking and defending routers and printers, optimizing antivirus software, and computer forensics.

Class Length

The class is typically 18 to 24 hours. All of the following formats have been used:

  1. Three straight days, morning and afternoon
  2. Five 4-hour classes
  3. Seven 3-hour classes


Basic computer skills and familiarity with Windows.

Agenda (each session includes hands-on lab activities)

  • Session 1
    • Vocabulary and concepts: security, types of attacks, types of attackers, security strategy. Create fake accounts.
  • Session 2
    • Password hacks and security, social engineering. Identity theft techniques. Social networking attacks and defense.
  • Session 3
    • Types of malware, installation methods, discovering malware, removing malware, preventing malware. Computer security, antivirus tricks, backups, recovering from an attack.
  • Session 4
    • Web and Internet attacks, email and browser attacks, defense and recovery. Create fake websites and email attacks. Encryption and decryption methods.

  • Session 5
    • Mobile and wireless security. Phone and tablet attacks. Attack laptops wirelessly. Secure phones, tablets, and laptops. Attack wireless routers. Create fake wireless access points.
  • Session 6
    • Business network security. Attacks on printers and routers. Physical security. Access control.
  • Session 7
    • Computer forensics. Log files. Disaster recovery.
  • Session 8
    • “War Games.” Students attack each other’s computers while defending their own, using methods learned in class. (Controlled and harmless. The computers can immediately be returned to service.)