Get in Touch

Course Outline

Introduction

  • Overview of cybersecurity concepts and definitions
  • Distinction between Information Security and Cybersecurity

Security Architecture and Frameworks

  • Enterprise architecture framework
  • OSI model and definitions
  • Defense in depth
  • Information flow control
  • Isolation and segmentation
  • Logging, monitoring, and detection
  • Encryption techniques and tools

Asset Security (Networks, Systems, Applications, and Data)

  • Identity management
  • Risk assessment
  • Vulnerability management
  • Penetration testing
  • Network security
  • Operating system security
  • Application security
  • Data security

Security Operations and Response

  • Distinguishing events from incidents
  • Legal and regulatory compliance
  • Digital forensics
  • Incident classification
  • Business continuity and disaster recovery
  • Incident response and handling

Challenges Associated with Emerging Technologies

  • Threat landscape
  • Advanced persistent threats
  • Risks associated with mobile technology
  • Consumerization of IT (IoT, Big Data, and AI)
  • Risks inherent in Cloud Computing

Summary and Next Steps

Requirements

  • n/a

Target Audience

  • IT professionals
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories