Cybersecurity Foundations
- Course Code 9701
- Duration 5 days
Course Delivery
Additional Payment Options
-
GTC 29 inc. VAT
GTC, Global Knowledge Training Credit, please contact Global Knowledge for more details
Jump to:
Course Delivery
This course is available in the following formats:
-
Blended Live
Learning that is blended in some way
-
Company Event
Event at company
-
Elearning (Self-paced)
Self paced electronic learning
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopCourse Schedule
TopTarget Audience
TopNetwork professionals looking to advance their knowledge and explore cybersecurity as a career path
Executives and managings looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level
Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities
Course Objectives
Top- Increase your awareness of security
- Interpret/analyze tool output for network mapping/footprinting
- Reduce attack surface of systems
- Review networking as it applies to security controls
- Explore different data protection principles
- Examine the role of PKI/certificates in building trusted relationships between devices in a network
- Implement login security and other identity management solutions
- Reduce attack surface of network devices
- Explore current malware threats and anti-malware solutions
- Explore social engineering threats, methods, and techniques
- Examine software vulnerabilities and security solutions for reducing the risk of exploitation
- Explain monitoring capabilities and requirements and how those may raise privacy concerns
- Identify physical security controls and the relationship between physical and IT security
- Explain incident response capabilities
- Identify legal considerations and investigative techniques when it comes to cybersecurity
- Research trends in cybersecurity
Course Content
Top
This delivery format includes both instructor-led sessions and On-Demand sessions.
Week 1 – Kick-off and introduction to Cybersecurity
Class session:
Introduction to course, review course schedule, expectations, etc.
Introduction to Governance, Risk, Compliance module
On-Demand modules to complete by next week’s class:
Cybersecurity Awareness
- What is security?
- Confidentiality, integrity, and availability
- Security baselining
- Security concerns: Humans
- Types of threats
- Security controls
- What is hacking?
- Risk management
- Data in motion vs. data at rest
Legal Considerations
- Regulatory compliance
- Cybercrime
Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.
Week 2 – Governance, Risk, Compliance
Class session:
Challenge lab: Research and analyze internal security policies
Introduction to Secure Architecture and DevSecOps modules
On-Demand modules to complete by next week’s class:
Security Architecture
- Security architecture
- Network devices
- Network zones
- Network segmentation
- Network Address Translation
- Network Access Control
Data Security
- Cryptography
- Principles of permissions
- Steganography
Network Discovery
- Networking review
- Discovery, footprinting, and scanning
- Common vulnerabilities and exposures
- Security policies
- Vulnerabilities
Systems Hardening
- What is hardening?
- Types of systems that can be hardened
- Security baselines
- How to harden systems
- Hardening systems by role
- Mobile devices
- Hardening on the network
- Analysis tools
- Authentication, authorization, and accounting
- Physical security
Network Hardening
- Limiting remote admin access
- AAA: Administrative access
- Simple Network Management Protocol
- Network segmentation
- Limiting physical access
- Establishing secure access
- Network devices
- Fundamental device protection summary
- Traffic filtering best practices
Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.
Week 3 – Secure Architecture and DevSecOps
Class session:
Challenge lab:
- Outline a security architecture
- Validate security using network tools
Introduction to Identity Access Management modules
On-Demand modules to complete by next week’s class:
Public Key Infrastructure
- Public key infrastructure
- Certification authorities
- Enabling trust
- Certificates
- CA management
Identity Management
- What is identity management?
- Personally identifiable information
- Authentication factors
- Directory services
- Kerberos
- Windows NT LAN Manager
- Password policies
- Cracking passwords
- Password assessment tools
- Password managers
- Group accounts
- Service accounts
- Federated identities
- Identity as a Service
Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.
Week 4 – Identity Access Management
Class session:
Challenge lab:
- Recommend an identity and access management solution
Introduction to Penetration Testing and Secure Software Development modules
On-Demand modules to complete by next week’s class:
Social Engineering
- What is social engineering?
- Social engineering targets
- Social engineering attacks
- Statistical data
- Information harvesting
- Preventing social engineering
- Cyber awareness: Policies and procedures
- Social media
Physical Security
- What is physical security?
- Defense in depth
- Types of physical security controls
- Device security
- Human security
- Security policies
- Equipment tracking
Software Security
- Software engineering
- Security guidelines
- Software vulnerabilities
Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.
Week 5 – Penetration Testing and Secure Software Development
Class session:
Challenge lab:
- Recommend controls to prevent or control social engineering tactics
- Analyze notable software security vulnerabilities
Introduction to Data Loss Prevention and Incident Response modules
On-Demand modules to complete by next week’s class:
Environment Monitoring
- Monitoring
- Monitoring vs. logging
- Monitoring/logging benefits
- Logging
- Metrics
Malware
- What is malware?
- Infection methods
- Types of malware
- Backdoors
- Countermeasures
- Protection tools
Incident Response
- Disaster types
- Incident investigation tips
- Business continuity planning
- Disaster recovery plan
- Forensic incident response
Trends in Cybersecurity
- Cybersecurity design constraints
- Cyber driving forces
- How connected are you?
- How reliant on connectivity are you?
- Identity management
- Cybersecurity standards
- Cybersecurity training
Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.
Week 6 – Data Loss Prevention and Incident Response
Class session:
Challenge lab:
- Analyze data loss vulnerabilities
- Create an incident response strategy
Reminder: To maximize your time and participation in next week's lab exercises, please complete the above modules prior to class.
Course Prerequisites
TopAttendees should meet the following prerequisites:
- TCP/IP Networking or equivalent knowledge
Test Certification
TopRecommended as preparation for the following exams:
- There are no exams currently aligned to this course
Follow on Courses
TopThe following courses are recommended for further study:
- CEH - Certifed Ethical Hacker
- CISM - Certified Information Security Manager