Course Outline

Introduction

  • Overview of Cybersecurity concepts and definitions
  • Information security vs Cybersecurity

Security Architecture and Frameworks

  • Enterprise architecture framework
  • OSI model and definitions
  • Defense in depth
  • Information flow control
  • Isolation and segmentation
  • Logging, monitoring, and detection
  • Encryption techniques and tools

Security of Assets (Networks, Systems, Applications, and Data)

  • Identity management
  • Risk assessment
  • Vulnerability management
  • Penetration testing
  • Network security
  • Operating system security
  • Application security
  • Data security

Security Operations and Responses

  • Event vs Incident
  • Legal and regulatory compliance
  • Digital forensics
  • Incident categories
  • Business continuity and disaster recovery
  • Incident response and handling

Common Challenges with Emerging Technologies

  • Threat landscape
  • Advanced persistent threats
  • Mobile technology risks
  • Consumerization of IT (IoT, Big Data, and AI)
  • Risks of Cloud Computing

Summary and Next Steps

Requirements

  • n/a

Audience

  • IT professionals
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses