Skip to main Content

Cybersecurity Foundations

  • Course Code 9701
  • Duration 5 days

Additional Payment Options

  • GTC 29 inc. VAT

    GTC, Global Knowledge Training Credit, please contact Global Knowledge for more details

Blended Live Price

£1,795.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Blended Live

    Learning that is blended in some way

  • Company Event

    Event at company

  • Elearning (Self-paced)

    Self paced electronic learning

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

Course Schedule

Top

Target Audience

Top

Network professionals looking to advance their knowledge and explore cybersecurity as a career path

Executives and managings looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level

Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities

Course Objectives

Top
  • Increase your awareness of security
  • Interpret/analyze tool output for network mapping/footprinting
  • Reduce attack surface of systems
  • Review networking as it applies to security controls
  • Explore different data protection principles
  • Examine the role of PKI/certificates in building trusted relationships between devices in a network
  • Implement login security and other identity management solutions
  • Reduce attack surface of network devices
  • Explore current malware threats and anti-malware solutions
  • Explore social engineering threats, methods, and techniques
  • Examine software vulnerabilities and security solutions for reducing the risk of exploitation
  • Explain monitoring capabilities and requirements and how those may raise privacy concerns
  • Identify physical security controls and the relationship between physical and IT security
  • Explain incident response capabilities
  • Identify legal considerations and investigative techniques when it comes to cybersecurity
  • Research trends in cybersecurity

Course Content

Top


This delivery format includes both instructor-led sessions and On-Demand sessions.

Week 1 – Kick-off and introduction to Cybersecurity

Class session:

Introduction to course, review course schedule, expectations, etc.

Introduction to Governance, Risk, Compliance module

On-Demand modules to complete by next week’s class:

Cybersecurity Awareness

  • What is security?
  • Confidentiality, integrity, and availability
  • Security baselining
  • Security concerns: Humans
  • Types of threats
  • Security controls
  • What is hacking?
  • Risk management
  • Data in motion vs. data at rest

Legal Considerations

  • Regulatory compliance
  • Cybercrime

Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.

Week 2  – Governance, Risk, Compliance

Class session:

Challenge lab: Research and analyze internal security policies

Introduction to Secure Architecture and DevSecOps modules

On-Demand modules to complete by next week’s class:

Security Architecture

  • Security architecture
  • Network devices
  • Network zones
  • Network segmentation
  • Network Address Translation
  • Network Access Control

Data Security

  • Cryptography
  • Principles of permissions
  • Steganography

Network Discovery

  • Networking review
  • Discovery, footprinting, and scanning
  • Common vulnerabilities and exposures
  • Security policies
  • Vulnerabilities

Systems Hardening

  • What is hardening?
  • Types of systems that can be hardened
  • Security baselines
  • How to harden systems
  • Hardening systems by role
  • Mobile devices
  • Hardening on the network
  • Analysis tools
  • Authentication, authorization, and accounting
  • Physical security

Network Hardening

  • Limiting remote admin access
  • AAA: Administrative access
  • Simple Network Management Protocol
  • Network segmentation
  • Limiting physical access
  • Establishing secure access
  • Network devices
  • Fundamental device protection summary
  • Traffic filtering best practices

Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.

Week 3  – Secure Architecture and DevSecOps

Class session:

Challenge lab:

  • Outline a security architecture
  • Validate security using network tools

Introduction to Identity Access Management modules

On-Demand modules to complete by next week’s class:

Public Key Infrastructure

  • Public key infrastructure
  • Certification authorities
  • Enabling trust
  • Certificates
  • CA management

Identity Management

  • What is identity management?
  • Personally identifiable information
  • Authentication factors
  • Directory services
  • Kerberos
  • Windows NT LAN Manager
  • Password policies
  • Cracking passwords
  • Password assessment tools
  • Password managers
  • Group accounts
  • Service accounts
  • Federated identities
  • Identity as a Service

Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.

Week 4  – Identity Access Management

Class session:

Challenge lab:

  • Recommend an identity and access management solution

Introduction to Penetration Testing and Secure Software Development modules

On-Demand modules to complete by next week’s class:

Social Engineering

  • What is social engineering?
  • Social engineering targets
  • Social engineering attacks
  • Statistical data
  • Information harvesting
  • Preventing social engineering
  • Cyber awareness: Policies and procedures
  • Social media

Physical Security

  • What is physical security?
  • Defense in depth
  • Types of physical security controls
  • Device security
  • Human security
  • Security policies
  • Equipment tracking

Software Security

  • Software engineering
  • Security guidelines
  • Software vulnerabilities

Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.

Week 5  – Penetration Testing and Secure Software Development

Class session:

Challenge lab:

  • Recommend controls to prevent or control social engineering tactics
  • Analyze notable software security vulnerabilities

Introduction to Data Loss Prevention and Incident Response modules

On-Demand modules to complete by next week’s class:

Environment Monitoring

  • Monitoring
  • Monitoring vs. logging
  • Monitoring/logging benefits
  • Logging
  • Metrics

Malware

  • What is malware?
  • Infection methods
  • Types of malware
  • Backdoors
  • Countermeasures
  • Protection tools

Incident Response

  • Disaster types
  • Incident investigation tips
  • Business continuity planning
  • Disaster recovery plan
  • Forensic incident response

Trends in Cybersecurity

  • Cybersecurity design constraints
  • Cyber driving forces
  • How connected are you?
  • How reliant on connectivity are you?
  • Identity management
  • Cybersecurity standards
  • Cybersecurity training

Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.

Week 6  – Data Loss Prevention and Incident Response

Class session:

Challenge lab:

  • Analyze data loss vulnerabilities
  • Create an incident response strategy

Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.

Course Prerequisites

Top

Attendees should meet the following prerequisites:

  • TCP/IP Networking or equivalent knowledge

Test Certification

Top

Recommended as preparation for the following exams:

  • There are no exams currently aligned to this course

Follow on Courses

Top

The following courses are recommended for further study:

  • CEH - Certifed Ethical Hacker
  • CISM - Certified Information Security Manager
Cookie Control toggle icon