The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security. Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of
The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security.
Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of CISSP.
This course will be useful as a primer to those wishing to follow a self-study route to obtain the certification or as a refresher.
However, the course will be also be useful to all those candidates with existing IT skills who are entering into a new role in information or cyber security.
This 3-day cyber security skills course features a significant amount of live demonstration and attendee participation (either alone and in groups) to provide a comprehensive overview of the main topics of cyber security.
Pre-requisites:
No formal cyber security experience is required however, candidates will need to have an intermediate-level in technical skills and experience in the areas of data networking (TCP/IP), and operating systems (Windows and/or Linux).
Day 1
Security and Risk Management
Asset Security
Security Architecture and Engineering
Day 2
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Day 3
Security Operations
Software Development Security
Course Content
Part 1: Security and Risk Management
Information Security & Cyber Security Management Governance
The CIA Triad: Confidentiality, Integrity & Availability
Constructing Security Policies
Managing Technical Information and Cyber Security Risks
Managing Personnel and Administrative Security Risks
Computer Crime and UK Law
Major UK statutory and regulatory
Intellectual Property (IP) law
UK Data Protection Act & EU Council General Directive on Data Protection
Business Continuity and Disaster Recovery Planning
(Exercises: Examine scenarios of risk management selected from a number of sectors and fictional organisations as worked examples)
Part 2: Asset Security
Information Classification
Determine and maintain ownership
Maintaining Privacy
Information Asset Handling and Retention
(Exercises/Demos: Work through a series of scenarios to select information classification and privacy policies).
Part 3: Security Engineering
Defining Security Engineering practices and principles
Architecture Frameworks
Security Modelling
Evaluation Criteria
Enterprise and System Security Architecture
Distributed Systems
Security Threats, Safeguards & Countermeasures
Cryptographic techniques
Physical security controls
(Exercises/Demos: Following the supplied sample documentation, identify threats and threat actors, and choose suitable controls).
Part 4: Communications and Network Security
Network and communications architecture design principles
Securing networks and communication paths
Network Attacks & Defences
(Exercises/Demos: Review sample simulated network devices and configurations).
Part 5: Identity and Access Management
Physical and Logical access controls for information assets
Identification and Authentication methods
Identity and Access services and lifecycle
Authorisation methods
Access Control Attacks & Defences
(Exercises/Demos: Review sample authentication controls applied to Windows & Linux devices).
Part 6: Security Assessment and Testing
Design verification and validation and testing strategies
Conducting security control testing
Collecting security performance indicators and metrics
Test analysis and reporting
Internal and External Auditing
(Exercises/Demos: Worked example of test strategy & plans with reporting and analysis).
Part 7: Security Operations
Planning investigations
Security Investigation types
Logging and monitoring
Provisioning resources
Concepts of Security Operations
Resource protection techniques
Incident Management
Preventative & Detective operations
Implement and support patch and vulnerability management
Participate in and understand change management processes
Implement recovery strategies and disaster recovery processes
(Exercises/Demos: Simulated setup of SIEM and Incident scenarios, with change management and disaster).
Part 8: Software Development Security
Secure Software Development Lifecycle
Security Controls and best practices for Development Environments
Audit and Risk Management in software development
Testing Software
Career Change Wales (CCW) – Training Academy, is an innovative training provider in Cardiff, South Wales, providing specialised training in leadership training, management, ICT and specialist programme including your ‘Retraining and Upskilling’.
Our training courses are conducted by professionals with practical experience in their expert area of works. Our course modules are designed to suit clients’ requirements.
Our unique selling points (USP) are in delivering our training courses in small group (maximum of 6 person per session) and we are committed.
To quality training to our clients. We are the only training provider in Wales to provide support and advise to customers after they have completed their training with us.
Certified Cloud Security Engineer (CCSP) is another (ISC)² (International Information System Security Consortium) certification with a holistic approach to inspiring a safe and secure cyber world.
In this course, you’ll learn how to analyse, monitor, and protect an organisation’s infrastructure using threat-detection and threat-analysis tools.
Become a specialized professional in hacking computer system and securing them like an expert.
This one day theory based course has been designed by security consultants, which aims to provide candidates with an understanding of the principles of security, risk management and the role of cybersecurity professionals within an organization.
This Network Security course covers the key aspects related to the protection of the sensitive information on a computer network. It details the various mechanisms developed to provide fundamental security services for data communication.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy