Course Outline
Introduction
- Overview of Cybersecurity concepts and definitions
- Information security vs Cybersecurity
Security Architecture and Frameworks
- Enterprise architecture framework
- OSI model and definitions
- Defense in depth
- Information flow control
- Isolation and segmentation
- Logging, monitoring, and detection
- Encryption techniques and tools
Security of Assets (Networks, Systems, Applications, and Data)
- Identity management
- Risk assessment
- Vulnerability management
- Penetration testing
- Network security
- Operating system security
- Application security
- Data security
Security Operations and Responses
- Event vs Incident
- Legal and regulatory compliance
- Digital forensics
- Incident categories
- Business continuity and disaster recovery
- Incident response and handling
Common Challenges with Emerging Technologies
- Threat landscape
- Advanced persistent threats
- Mobile technology risks
- Consumerization of IT (IoT, Big Data, and AI)
- Risks of Cloud Computing
Summary and Next Steps
Requirements
- n/a
Audience
- IT professionals
Testimonials (9)
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Trainer's knowledge and experience in this field
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job
Toby
Course - Application Security in the Cloud
The training was fun and the trainer was very friendly.
Sevan Cimen - amfori
Course - Open Source Cyber Intelligence - Introduction
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
The trainer provided up-to-date information and valuable references and tools.
Jose Vicente - EID
Course - C/C++ Secure Coding
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.