The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security. Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of
The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security.
Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of CISSP.
This course will be useful as a primer to those wishing to follow a self-study route to obtain the certification or as a refresher.
However, the course will be also be useful to all those candidates with existing IT skills who are entering into a new role in information or cyber security.
This 3-day cyber security skills course features a significant amount of live demonstration and attendee participation (either alone and in groups) to provide a comprehensive overview of the main topics of cyber security.
Pre-requisites:
No formal cyber security experience is required however, candidates will need to have an intermediate-level in technical skills and experience in the areas of data networking (TCP/IP), and operating systems (Windows and/or Linux).
Day 1
Security and Risk Management
Asset Security
Security Architecture and Engineering
Day 2
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Day 3
Security Operations
Software Development Security
Course Content
Part 1: Security and Risk Management
Information Security & Cyber Security Management Governance
The CIA Triad: Confidentiality, Integrity & Availability
Constructing Security Policies
Managing Technical Information and Cyber Security Risks
Managing Personnel and Administrative Security Risks
Computer Crime and UK Law
Major UK statutory and regulatory
Intellectual Property (IP) law
UK Data Protection Act & EU Council General Directive on Data Protection
Business Continuity and Disaster Recovery Planning
(Exercises: Examine scenarios of risk management selected from a number of sectors and fictional organisations as worked examples)
Part 2: Asset Security
Information Classification
Determine and maintain ownership
Maintaining Privacy
Information Asset Handling and Retention
(Exercises/Demos: Work through a series of scenarios to select information classification and privacy policies).
Part 3: Security Engineering
Defining Security Engineering practices and principles
Architecture Frameworks
Security Modelling
Evaluation Criteria
Enterprise and System Security Architecture
Distributed Systems
Security Threats, Safeguards & Countermeasures
Cryptographic techniques
Physical security controls
(Exercises/Demos: Following the supplied sample documentation, identify threats and threat actors, and choose suitable controls).
Part 4: Communications and Network Security
Network and communications architecture design principles
Securing networks and communication paths
Network Attacks & Defences
(Exercises/Demos: Review sample simulated network devices and configurations).
Part 5: Identity and Access Management
Physical and Logical access controls for information assets
Identification and Authentication methods
Identity and Access services and lifecycle
Authorisation methods
Access Control Attacks & Defences
(Exercises/Demos: Review sample authentication controls applied to Windows & Linux devices).
Part 6: Security Assessment and Testing
Design verification and validation and testing strategies
Conducting security control testing
Collecting security performance indicators and metrics
Test analysis and reporting
Internal and External Auditing
(Exercises/Demos: Worked example of test strategy & plans with reporting and analysis).
Part 7: Security Operations
Planning investigations
Security Investigation types
Logging and monitoring
Provisioning resources
Concepts of Security Operations
Resource protection techniques
Incident Management
Preventative & Detective operations
Implement and support patch and vulnerability management
Participate in and understand change management processes
Implement recovery strategies and disaster recovery processes
(Exercises/Demos: Simulated setup of SIEM and Incident scenarios, with change management and disaster).
Part 8: Software Development Security
Secure Software Development Lifecycle
Security Controls and best practices for Development Environments
Audit and Risk Management in software development
Testing Software
Career Change Wales (CCW) – Training Academy, is an innovative training provider in Cardiff, South Wales, providing specialised training in leadership training, management, ICT and specialist programme including your ‘Retraining and Upskilling’.
Our training courses are conducted by professionals with practical experience in their expert area of works. Our course modules are designed to suit clients’ requirements.
Our unique selling points (USP) are in delivering our training courses in small group (maximum of 6 person per session) and we are committed.
To quality training to our clients. We are the only training provider in Wales to provide support and advise to customers after they have completed their training with us.
With today's complex and diverse enterprise networks, maintaining security is one of the greatest challenges organisations face. It is difficult to properly configure systems and networks for maximum security.
Get your staff better protected through KnowBe4’s Security Awareness Training, with the largest commercially available training library, and a wide array of Simulated Phishing scenarios that will engage, inform, and upskill your workers to ensure that they don’t make mistakes as your infrastruc...
Snort is one of the most widely used open-source IPS (Intrusion Prevention System) used widely across the world.
We believe that we have the right core elements to ensure that the key areas of a young persons life are covered to understand how we can all keep both their homelife and school life safer.
The ECT’s course is designed to identify the main risks affecting businesses today, provide guidance on the legal requirements and offer practical solutions on how to manage and reduce these threats.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy