Cyber Security Skills For It Staff (New Cyber Security Course)

by CCW Training Academy Claim Listing

The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security. Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

CCW Training Academy Logo

img Duration

3 Days

Course Details

The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security.

Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of CISSP.

This course will be useful as a primer to those wishing to follow a self-study route to obtain the certification or as a refresher.

However, the course will be also be useful to all those candidates with existing IT skills who are entering into a new role in information or cyber security.

This 3-day cyber security skills course features a significant amount of live demonstration and attendee participation (either alone and in groups) to provide a comprehensive overview of the main topics of cyber security.

 

Pre-requisites:

No formal cyber security experience is required however, candidates will need to have an intermediate-level in technical skills and experience in the areas of data networking (TCP/IP), and operating systems (Windows and/or Linux).

Day 1

  • Security and Risk Management

  • Asset Security

  • Security Architecture and Engineering

Day 2

  • Communications and Network Security

  • Identity and Access Management

  • Security Assessment and Testing

Day 3

  • Security Operations

  • Software Development Security

 

Course Content

Part 1: Security and Risk Management

  • Information Security & Cyber Security Management Governance

  • The CIA Triad: Confidentiality, Integrity & Availability

  • Constructing Security Policies

  • Managing Technical Information and Cyber Security Risks

  • Managing Personnel and Administrative Security Risks

  • Computer Crime and UK Law

  • Major UK statutory and regulatory

  • Intellectual Property (IP) law

  • UK Data Protection Act & EU Council General Directive on Data Protection

  • Business Continuity and Disaster Recovery Planning

(Exercises: Examine scenarios of risk management selected from a number of sectors and fictional organisations as worked examples)

Part 2: Asset Security

  • Information Classification

  • Determine and maintain ownership

  • Maintaining Privacy

  • Information Asset Handling and Retention

(Exercises/Demos: Work through a series of scenarios to select information classification and privacy policies).

Part 3: Security Engineering

  • Defining Security Engineering practices and principles

  • Architecture Frameworks

  • Security Modelling

  • Evaluation Criteria

  • Enterprise and System Security Architecture

  • Distributed Systems

  • Security Threats, Safeguards & Countermeasures

  • Cryptographic techniques

  • Physical security controls

(Exercises/Demos: Following the supplied sample documentation, identify threats and threat actors, and choose suitable controls).

Part 4: Communications and Network Security

  • Network and communications architecture design principles

  • Securing networks and communication paths

  • Network Attacks & Defences

(Exercises/Demos: Review sample simulated network devices and configurations).

Part 5: Identity and Access Management

  • Physical and Logical access controls for information assets

  • Identification and Authentication methods

  • Identity and Access services and lifecycle

  • Authorisation methods

  • Access Control Attacks & Defences

(Exercises/Demos: Review sample authentication controls applied to Windows & Linux devices).

Part 6: Security Assessment and Testing

  • Design verification and validation and testing strategies

  • Conducting security control testing

  • Collecting security performance indicators and metrics

  • Test analysis and reporting

  • Internal and External Auditing

(Exercises/Demos: Worked example of test strategy & plans with reporting and analysis).

Part 7: Security Operations

  • Planning investigations

  • Security Investigation types

  • Logging and monitoring

  • Provisioning resources

  • Concepts of Security Operations

  • Resource protection techniques

  • Incident Management

  • Preventative & Detective operations

  • Implement and support patch and vulnerability management

  • Participate in and understand change management processes

  • Implement recovery strategies and disaster recovery processes

(Exercises/Demos: Simulated setup of SIEM and Incident scenarios, with change management and disaster).

Part 8: Software Development Security

  • Secure Software Development Lifecycle

  • Security Controls and best practices for Development Environments

  • Audit and Risk Management in software development

  • Testing Software

  • Cardiff Branch

    5-7 Museum Place, Cardiff

Check out more Cybersecurity courses in UK

Texial Cyber Security Logo

Certified Penetration Testing Professional Course

Our Penetration Testing  Training helps you to be a certified penetration testing professional (CPENT), an individual who uses the same tools and techniques as hackers to look for and exploit vulnerabilities in a supervised and legal way in computer systems.

by Texial Cyber Security [Claim Listing ]
London IT Training (LIT) Logo

Comptia Cybersecurity Analyst (CYSA+) Training (CS0-002)

Data breaches are now being considered a regular part of the digital world, whether you like it or not. Several factors are involved in Data breaching and CompTIA Cybersecurity Analyst (CySA+) training course will help the candidates to anticipate probable causes of such an attack.

by London IT Training (LIT)
West College Scotland Logo

Cyber Security Made Easy For IT Managers

This is a 2-day primer course for managers who need to get-‘up-to-speed’ with cyber security issues so they can analyse their exposure to security threats.  Candidates should have some pre-existing knowledge of basic networking, TCP/IP and IPv6.

by West College Scotland [Claim Listing ]
MS Net Manage Services Logo

Security Awareness Training

Security Awareness Training and Phishing simulations go hand in hand. Phishing has become very sophisticated and almost undetectable, as criminals have found ways to make their E-mails as realistic as possible.

by MS Net Manage Services [Claim Listing ]
AMP Information Systems Ltd Logo

Cyber Security Training

Businesses today face a range of cyber security threats, so it’s important to be aware of how and where vulnerabilities can occur. This session looks at what physical and digital security measures you can put in place, and how to keep your working practices safe and sustainable.

by AMP Information Systems Ltd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy