Course Outline

Introduction

  • Overview of Cybersecurity concepts and definitions
  • Information security vs Cybersecurity

Security Architecture and Frameworks

  • Enterprise architecture framework
  • OSI model and definitions
  • Defense in depth
  • Information flow control
  • Isolation and segmentation
  • Logging, monitoring, and detection
  • Encryption techniques and tools

Security of Assets (Networks, Systems, Applications, and Data)

  • Identity management
  • Risk assessment
  • Vulnerability management
  • Penetration testing
  • Network security
  • Operating system security
  • Application security
  • Data security

Security Operations and Responses

  • Event vs Incident
  • Legal and regulatory compliance
  • Digital forensics
  • Incident categories
  • Business continuity and disaster recovery
  • Incident response and handling

Common Challenges with Emerging Technologies

  • Threat landscape
  • Advanced persistent threats
  • Mobile technology risks
  • Consumerization of IT (IoT, Big Data, and AI)
  • Risks of Cloud Computing

Summary and Next Steps

Requirements

  • n/a

Audience

  • IT professionals
  14 Hours
 

Number of participants


Starts

Ends


Dates are subject to availability and take place between 09:30 and 16:30.
Open Training Courses require 5+ participants.

Testimonials (4)

Related Courses

CRISC - Certified in Risk and Information Systems Control

  21 Hours

Standard Java Security

  14 Hours

Java and Web Application Security

  21 Hours

Advanced Java Security

  21 Hours

Advanced Java, JEE and Web Application Security

  28 Hours

.NET, C# and ASP.NET Security Development

  14 Hours

Comprehensive C# and .NET Application Security

  21 Hours

Advanced C#, ASP.NET and Web Application Security

  21 Hours

Related Categories