Cybersecurity Fundamentals
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
As the digital era has gifted us a massive technological innovation, organizations and companies have spent the past several decades aggressively increasing their online presence to reach new customers and grow their digital presence. It is not surprising, then, that cybercrime also escalated simultaneously. The omnipresence of the internet and growing access to it have made it easier than ever before for cybercriminals to target businesses and gain access to personal information about their customers or employees.
In this course you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain. You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.
-
COURSE OBJECTIVES
- Learn the fundamentals of Cybersecurity and identify the concepts required to recognize attacks against networks as well as mission critical infrastructure.
-
Learn how to successfully architect a Cybersecurity solution for your organization
-
NIST (National Institute of Science and Technology) Cybersecurity framework
-
Cyber risks, COBIT 5 and DSS05
-
Learn how to implement control frameworks
-
Understand Cyber essential framework and IT security policies
-
Work with security threats, malware, cyber crime, callbacks, ransomware, and rootkits
-
Understand advanced persistent threats (APTs)
-
Learn how to architect a security risk
-
Work with managing user access and identity
- Basic cryptography concepts
- Network and system administration fundamentals
- Information assurance fundamentals such as confidentiality, integrity and availability, etc.
-
COURSE AUDIENCE
This course is made for :
- Beginner in cybersecurity
- IT engineers
- Security Analysts
- Ethical Hackers
- Software Developers
- Architects
- Web Application Developers
-
COURSE OUTLINE
Day One
Introduction
- Computing Security Concepts and Problems
- Fundamentals of cybersecurity
Day Two
Cybersecurity Fundamentals
- Threat Actors, Attacks, and Mitigation
- Security Policies and Procedures
- Cybersecurity Mitigation Methods
Day Three
Enterprise Architecture
- Secure Architecture
- Wireless Networks
- etwork Security Controls
- Cloud, Virtualization, BYOD, and IOT Security
Day Four
Information System Governance
- Information Security Governance
- Risk Management
- Information Security Programs
Day Five
Incident Management
- Developing an Incident Management and Response System
- Digital Forensics
- Business Continuity and Disaster Recovery