Certified CyberSecurity Professional

Course Highlight -

In these 3 days, you will be introduced to strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.

What You Will Learn

  • Assess information security risk in computing and network environments
  • Create an information assurance lifecycle process
  • Analyze threats to computing and network environments
  • Design secure computing and network environments
  • Operate secure computing and network environments
  • Assess the security posture within a risk management framework
  • Collect cybersecurity intelligence information
  • Analyze collected intelligence to define actionable response
  • Respond to cybersecurity incidents
  • Investigate cybersecurity incidents
  • Audit secure computing and network environments<.li> .

    Who Should Attend

  • Anyone needing a robust introduction to Cyber Security
  • Anyone planning to work in a position that requires cybersecurity knowledge
  • Anyone starting a career in Information / Cybersecurity
  • IT professionals wanting to transition their career into Cyber Security
  • Anyone with information/cybersecurity responsibilities
  • Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
  • Professionals familiar with basic IT and information security concepts and who need to round out their knowledge
  • Course Content

    Module 1

  • Concepts and Definitions
  • Difference between IT Security, Information Security, and Cyber Security
  • Assets, Threats & Vulnerabilities
  • Cyber Security Strategy
  • Supporting Business Goals and Objectives
  • Cyber Security Policy Framework
  • Risk Management Concept Definitions
  • Risk Avoidance, Mitigation, Transfer, and Acceptance
  • Threats and Opportunities
  • Assessing the current threat landscape
  • The Internet of Things
  • Insourcing and Outsourcing
  • Module 2

  • The key role of security architecture
  • Security Architecture Frameworks
  • Security Architecture Design Principle
  • Service Models
  • Cryptography
  • Implementing Security
  • Network Security
  • Routers, switches, firewalls, intrusion detection and prevention
  • Endpoint Security
  • Servers, desktop systems, laptops, tablets, and mobile devices
  • Application Security
  • Data Security
  • Module 3

  • Business Continuity Planning
  • Disaster Recovery Planning
  • Testing and Maintenance of the BCP/DRP
  • Security Assurance
  • Vulnerability Assessments and Penetration Testing
  • Minimum Security Baseline
  • Module 4

  • Auditing, logging and security technologies
  • ecurity Information and Event Management System (SIEM)
  • Authorisation, encryption, firewalls, intrusion prevention, anti-malware
  • Security events and incidents
  • Legal aspects
  • Incident Response Process
  • Incident Management Team
  • Computer Forensics
  • The CCSP certification is administered by the board of IEMA and identifies those individuals and organizations who have been duly authorized to use the CCSP designation mark, they have met the rigorous professional standards, competency test and have agreed to adhere to the principles of integrity, objectivity, competence, fairness, confidentiality, professionalism, accountability, and diligence in dealing with clients.**<-

    Techro HTML5 template Back To Catalogue Page