Prerequisites
To apply for the Cyber Security Training you need to either:
- Essential computer networks & OS skills.
- Understand the fundamentals of IT security.
- An interest in learning about cyber threats and protection methods.
Course Curriculum
Module 1: Basics of Cybersecurity
1.1 Introduction to Cybersecurity
- The evolution of Cybersecurity.
- Cybersecurity & situational awareness.
- The Cybersecurity skills gap.
1.2 Difference between Information Security and Cybersecurity
- Protecting digital assets
1.3 Objectives of Cybersecurity
- Confidentiality, integrity, & availability
- Nonrepudiation
1.4 Roles of Cybersecurity
- Governance, risk management, & compliance
- What does a Cybersecurity professional do?
- Information Security roles
- Board of Directors
- Executive management
- Senior Information security management
- Cybersecurity practitioners
Module 2: Concepts of Cybersecurity
2.1 Risk
- Approaches to Cybersecurity
- Key terms and definitions
- Likelihood and impact
- Approaches to risk
- Third-party risk Risk management
2.2 Common Attack Types and Vectors
- Threat agents
- Attack attributes
- Generalized attack process
- Non-adversarial threat events
- Malware & attack types
2.3 Policies and Procedures
- Policy life cycle
- Guidelines
- Policy frameworks
- Types of Information Security policies
- Access control policy
- Personnel Information Security policy
- Security incident response policy
2.4 Cybersecurity Controls
- Identity management
- Provisioning & de-provisioning
- Authorization
- Access control lists
- Privileged user management
- Change management
- Configuration management
- Patch management
Module 3: Principles of Security Architecture
3.1 Overview of Security Architecture
- The security perimeter
- Interdependencies
- Security architectures & frameworks
- SABSA & the Zachman framework
- The open group architecture framework (TOGAF)
3.2 The OSI model
- TCP/IP
3.3 Defense in Depth
3.4 Firewalls
- Firewall general features
- Network firewall types
- Packet filtering firewalls
- Stateful inspection firewalls
- Stateless vs. stateful
- Examples of firewall implementations
- Firewall issues
- Firewall platforms
3.5 Isolation and Segmentation
- VLANs
- Security zones & DMZs
3.6 Monitoring, Detection, and Logging
- Ingress, egress, & data loss prevention (DLP)
- Antivirus & anti-malware
- Intrusion detection systems
- IDS limitations
- IDS policy
- Intrusion prevention systems
3.7 Cryptography Fundamentals
- Key elements of cryptographic systems
- Key systems
3.8 Encryption Techniques
- Symmetric (private) key encryption
- Asymmetric (private) key encryption
- Elliptical curve cryptography
- Quantum cryptography
- Advanced encryption standard
- Digital signature
- Virtual private network
- Wireless network protections
- Stored data
- Public key infrastructure
3.9 Encryption Applications
- Applications of cryptographic systems
Module 4: Security of Networks, Systems, Applications, and Data
4.1 Process Controls – Risk Assessments
- Attributes of risk Risk
- response workflow
- Risk analysis
- Evaluating security controls
- Risk assessment success criteria
- Managing risk
- Using the results of the risk assessment
4.2 Process Controls – Vulnerability Management
- Vulnerability management
- Vulnerability scans
- Vulnerability assessment
- Remediation Reporting & metrics
4.3 Process Controls – Penetration Testing
- Penetration testers
- Penetration testing phases
4.4 Network Security
- Network management
- LAN/WAN security
- Network risks
- Wireless local area networks
- Wired equivalent privacy & Wi-Fi protected access (WPA/WPA2)
- Ports & protocols
- Port numbers
- Protocol numbers & assignment
- services Virtual private networks
- Remote access
4.5 Operating System Security
- System/platform hardening
- Modes of operations
- File system permissions
- Credentials & privileges
- Command-line knowledge
- Logging & system monitoring
- Virtualization
- Specialized systems
4.6 Application Security
- System development life cycle (SDLC)
- Security within SDLC
- Design requirements
- Testing
- Review process
- Separation of development, testing, & production environments
- OWASP top ten
- Wireless application protocol (WAP)
4.7 Data Security
- Data classification
- Data owners Data
- classification requirements
- Database security
Module 5: Incident Response
5.1 Comparing Event and Incident
- Events vs. incident
- Types of incidents
5.2 Security Incident Response
- What is the incident response?
- Why do we need an incident response?
- Elements of an incident response plan
- Security event management
5.3 Investigations, Legal Holds, and Preservation
- Investigations
- Evidence preservation
- Legal requirements
5.4 Forensics
- Data protection
- Data acquisition
- Imaging
- Extraction
- Interrogation
- Ingestion/normalization
- Reporting
- Network traffic analysis
- Log file analysis Time lines
- Anti-forensics
5.5 Disaster recovery and business continuity plans
- What is a disaster?
- Business continuity & disaster recovery
- Business impact analysis
- Recovery time objectives (RTO)
- Recover point objective (RPO)
- IS business continuity planning
- Recovery concepts
- Backup procedures
Module 6: Security Implications and Adoption of Evolving Technology
6.1 Current Threat Landscape
6.2 Advanced persistent threats (APT’s)
- Evolution of the threat landscape
- Defining APTs
- APT characteristics
- APT targets
- Stages of an APT attack
6.3 Mobile Technology – Vulnerabilities, Threats, and Risk
- Physical risk
- Organizational risk
- Technical risk
- Activity monitoring & data retrieval
- Unauthorized network connectivity
- Web view/user interface (UI) impersonation
- Sensitive data leakage
- Unsafe sensitive data storage
- Unsafe sensitive data transmission
- Drive-by vulnerabilities
6.4 Consumerization of IT and Mobile Devices
- Consumerization of IT
- BYOD
6.5 Cloud and Digital Collaboration
- Risk of cloud computing
- Web application risk
- Benefits of cloud computing