Course Duration
24 hours, 3-day training workshop
Delivery
Face to face training or online training
Course Inclusive
Training materials & certificate of completion
Course Content
-
- 1.1 What is Cybersecurity?
- 1.2 How do Hacks Happen?
- 1.3 Case Studies and Sample Cybersecurity Breaches
- 1.4 Testing for Vulnerabilities in an Organization
- 1.5 End User Protection
- 1.6 Detecting Threats to an Organization
- 1.7 Moving Forward
-
- 2.1 What is Information Security Management?
- 2.2 Risk Management
- 2.3 Threat Modeling
- 2.4 Cryptography Fundamentals
- 2.5 Types of Cyber Attacks
-
- 3.1 Major CIS Control Groups
- 3.2 Current Industry Methods
- 3.3 Vulnerability Assessment Tools and Their Capabilities
- 3.4 Risk Management Processes
-
- 4.1 What is Virtualization?
- 4.2 Prevention and Mitigation
- 4.3 Patch Management Overview
- 4.4 Endpoint Security Overview
- 4.5 Application Whitelisting Overview
- 4.6 Security Information and Event Management (SIEM) Overview
- 4.7 Network Security Monitoring (NSM) Overview
- 4.8 Backup and Recovery Overview
-
- 5.1 Hubs/Switches/Firewalls
- 5.2 Network Design Principles
- 5.3 Network Security Architecture Concepts
- 5.4 Process of Traffic Flows Across the Network
- 5.5 Network Protocols, Dynamic Host Configuration Protocol, and Directory Services
- 5.6 Network Access, Identity and Access Management
- 5.7 Remote Access Technology
- 5.8 Intrusion Detection Methodologies and Techniques
- 5.9 Malware Analysis Concepts and Methodology
- 5.10 Sample Deployment of Cybersecurity