Certified CyberSecurity Professional
Course Highlight -
In these 3 days, you will be introduced to strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.
What You Will Learn
Assess information security risk in computing and network environments
Create an information assurance lifecycle process
Analyze threats to computing and network environments
Design secure computing and network environments
Operate secure computing and network environments
Assess the security posture within a risk management framework
Collect cybersecurity intelligence information
Analyze collected intelligence to define actionable response
Respond to cybersecurity incidents
Investigate cybersecurity incidents
Audit secure computing and network environments<.li>
.
Who Should Attend
Anyone needing a robust introduction to Cyber Security
Anyone planning to work in a position that requires cybersecurity knowledge
Anyone starting a career in Information / Cybersecurity
IT professionals wanting to transition their career into Cyber Security
Anyone with information/cybersecurity responsibilities
Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
Professionals familiar with basic IT and information security concepts and who need to round out their knowledge
Course Content
Module 1
Concepts and Definitions
Difference between IT Security, Information Security, and Cyber Security
Assets, Threats & Vulnerabilities
Cyber Security Strategy
Supporting Business Goals and Objectives
Cyber Security Policy Framework
Risk Management Concept Definitions
Risk Avoidance, Mitigation, Transfer, and Acceptance
Threats and Opportunities
Assessing the current threat landscape
The Internet of Things
Insourcing and Outsourcing
Module 2
The key role of security architecture
Security Architecture Frameworks
Security Architecture Design Principle
Service Models
Cryptography
Implementing Security
Network Security
Routers, switches, firewalls, intrusion detection and prevention
Endpoint Security
Servers, desktop systems, laptops, tablets, and mobile devices
Application Security
Data Security
Module 3
Business Continuity Planning
Disaster Recovery Planning
Testing and Maintenance of the BCP/DRP
Security Assurance
Vulnerability Assessments and Penetration Testing
Minimum Security Baseline
Module 4
Auditing, logging and security technologies
ecurity Information and Event Management System (SIEM)
Authorisation, encryption, firewalls, intrusion prevention, anti-malware
Security events and incidents
Legal aspects
Incident Response Process
Incident Management Team
Computer Forensics
The CCSP certification is administered by the board of IEMA and identifies those individuals and organizations who have been duly authorized to use the CCSP designation mark, they have met the rigorous professional standards, competency test and have agreed to adhere to the principles of integrity, objectivity, competence, fairness, confidentiality, professionalism, accountability, and diligence in dealing with clients.**<-