IT Security Fundamentals

Course Content

    • 1.1 What is Cybersecurity?
    • 1.2 How do Hacks Happen?
    • 1.3 Case Studies and Sample Cybersecurity Breaches
    • 1.4 Testing for Vulnerabilities in an Organization
    • 1.5 End User Protection
    • 1.6 Detecting Threats to an Organization
    • 1.7 Moving Forward
    • 2.1 What is Information Security Management?
    • 2.2 Risk Management
    • 2.3 Threat Modeling
    • 2.4 Cryptography Fundamentals
    • 2.5 Types of Cyber Attacks
    • 3.1 Major CIS Control Groups
    • 3.2 Current Industry Methods
    • 3.3 Vulnerability Assessment Tools and Their Capabilities
    • 3.4 Risk Management Processes
    • 4.1 What is Virtualization?
    • 4.2 Prevention and Mitigation
    • 4.3 Patch Management Overview
    • 4.4 Endpoint Security Overview
    • 4.5 Application Whitelisting Overview
    • 4.6 Security Information and Event Management (SIEM) Overview
    • 4.7 Network Security Monitoring (NSM) Overview
    • 4.8 Backup and Recovery Overview
    • 5.1 Hubs/Switches/Firewalls
    • 5.2 Network Design Principles
    • 5.3 Network Security Architecture Concepts
    • 5.4 Process of Traffic Flows Across the Network
    • 5.5 Network Protocols, Dynamic Host Configuration Protocol, and Directory Services
    • 5.6 Network Access, Identity and Access Management
    • 5.7 Remote Access Technology
    • 5.8 Intrusion Detection Methodologies and Techniques
    • 5.9 Malware Analysis Concepts and Methodology
    • 5.10 Sample Deployment of Cybersecurity
    • Makati
    • +63 2 8891 0713
    • +63 2 8751 6482

    • Intramuros
    • +63 2 8524-5572
    • Intramuros
    • 658 Muralla St., Intramuros, Manila 1002, Philippines


    • Makati
    • 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines