Cyber Security Body of Knowledge (CyBOK) Training Course
CyBOK provides a structured methodology for establishing foundational and standardized knowledge in the field of cyber security. It seeks to integrate cyber security into a unified academic curriculum and industry training framework by mapping out key knowledge areas.
This instructor-led live training (available online or onsite) is designed for software engineers and IT professionals aiming to deepen their understanding of CyBOK and enhance their theoretical and practical cyber security skills.
Upon completion of this training, participants will be able to:
- Comprehend the core concepts, definitions, and principles of cyber security.
- Develop specialized expertise in cyber security through the application of CyBOK knowledge areas.
- Acquire comprehensive foundational knowledge necessary to implement the CyBOK framework in practice.
- Promote organizational and community capabilities to prioritize data security and privacy.
- Identify opportunities for earning specializations and credentials relevant to cyber security careers.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical applications.
- Hands-on implementation within a live laboratory environment.
Customization Options
- The course primarily utilizes open-source tools tailored to your operating system (Windows, Linux, Mac, mobile devices, etc.) and specific organizational needs. Please contact us to coordinate.
- For personalized training arrangements, please reach out to us.
Course Outline
Introduction
- Overview of Cyber Security concepts and definitions
- Understanding the CyBOK knowledge areas (KAs)
- Applying CyBOK knowledge to address security challenges
Human, Organisational, and Regulatory Aspects
- Risk management and governance
- Law and regulation
- Human factors
- Privacy and online rights
Attacks and Defences
- Malware and attack technologies
- Adversarial behaviors
- Security operations and incident management
- Forensics
Systems Security
- Cryptography
- Operating systems and virtualisation
- Distributed systems security
- Formal methods for security
- Authentication, authorization, and accountability
Software Platform and Security
- Software security
- Web and mobile security
- Secure software lifecycle
Infrastructure Security
- Applied cryptography
- Network security
- Hardware security
- Cyber-physical systems security
- Physical layer and telecommunications security
Summary and Next Steps
Requirements
- Fundamental understanding of cyber security and software engineering
Target Audience
- Software engineers
- IT professionals
Open Training Courses require 5+ participants.
Cyber Security Body of Knowledge (CyBOK) Training Course - Booking
Cyber Security Body of Knowledge (CyBOK) Training Course - Enquiry
Cyber Security Body of Knowledge (CyBOK) - Consultancy Enquiry
Testimonials (2)
I enjoyed the hands on labs because they were engaging and very knowledge sharing
Sinoxolo - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
The huge amount of new information/knowledge I gained from this training!
David - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for system administrators who want to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for improved performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
ABAP Secure code
14 HoursUpon completion of this training, participants will be able to:
- Explain the principles of application security and common vulnerabilities
- Outline ABAP programming best practices and the proper handling of SY-SUBRC
- Understand the nature of injection vulnerabilities
- Describe available security testing tools
- Explain the functions of ATC and CVA
Course Format
- Interactive lectures and group discussions.
- Extensive exercises and practical activities.
- Hands-on implementation within a live-lab environment.
Active Directory for Admins
21 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for system administrators seeking to use Microsoft Active Directory for managing and securing data access.
Upon completion of this training, participants will be capable of:
- Deploying and configuring Active Directory.
- Establishing a domain and defining access rights for users and devices.
- Managing users and machines via Group Policies.
- Controlling access to file servers.
- Setting up a Certificate Service and handling certificates.
- Implementing and managing services such as encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the fundamental topics of secure coding that are critical for a wide range of web application developers. Participants will learn the core principles of secure programming by examining specific code snippets, identifying potential security vulnerabilities, and applying effective remediation strategies.
Throughout the course, you will observe demonstrations of real-world attacks and learn how to defend against them, building your confidence as you strive to enhance the security of your applications.
Duration: 3 days
Target Audience: Developers seeking to expand their expertise in secure coding practices.
Learning Outcomes
• Participants will acquire knowledge in:
• Web Application Security.
• Common Web Application Risks.
• Demo Web Application Penetration Testing.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid is an open-source platform designed for mobile devices, including smartphones and tablets. While it offers a wide range of security features to simplify the development of secure software, it lacks certain security mechanisms found in other mobile platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux kernel, the file system, and the general environment, as well as the use of permissions and other Android development components.
Common security pitfalls and vulnerabilities affecting both native code and Java applications are examined, along with recommendations and best practices to prevent and mitigate them. Many of the discussed issues are illustrated with real-world examples and case studies. Additionally, the course offers a brief overview of how to utilize security testing tools to identify potential security-related programming errors.
Participants attending this course will
- Gain a solid understanding of fundamental security concepts, IT security, and secure coding principles
- Explore the security solutions available on the Android platform
- Learn how to effectively utilize various security features provided by Android
- Discover information about recent Java vulnerabilities on Android
- Identify common coding mistakes and learn how to avoid them
- Understand vulnerabilities associated with native code on Android
- Recognize the severe consequences of improper buffer handling in native code
- Comprehend architectural protection techniques and their potential weaknesses
- Access resources and further reading materials on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have previously utilized various cryptographic building blocks (such as encryption and digital signatures). To help participants grasp the role and application of these cryptographic primitives, the course first establishes a solid foundation on the core requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification, and anonymity. It also highlights typical issues that can compromise these requirements and presents real-world solutions.
Given that cryptography is a critical aspect of network security, the course discusses essential cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Instead of delving into an in-depth mathematical background, these elements are examined from a developer's perspective, illustrating typical use-case examples and practical considerations related to crypto usage, such as public key infrastructures. The course introduces security protocols across various areas of secure communication, with an in-depth discussion on the most widely used protocol families, such as IPSEC and SSL/TLS.
Typical crypto vulnerabilities are examined, both concerning specific crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and others, as well as the RSA timing attack. For each issue, practical considerations and potential consequences are described, again without going into deep mathematical details.
Finally, as XML technology is central to data exchange in networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Acquire a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursSpanning three days, this course introduces the fundamental principles of writing secure C and C++ code. It focuses on defending against malicious users who may exploit vulnerabilities related to memory management and input handling.
Advanced Java Security
21 HoursEven seasoned Java developers often lack comprehensive mastery of the full range of security services provided by Java, as well as the various vulnerabilities that impact web applications built with Java.
In addition to introducing the security components of the Standard Java Edition, this course addresses security challenges within the Java Enterprise Edition (JEE) and web services. The discussion of specific services is grounded in the fundamentals of cryptography and secure communication. Through a series of exercises, participants explore declarative and programmatic security techniques in JEE, while also examining transport-layer and end-to-end security for web services. The practical application of these components is demonstrated through hands-on exercises, allowing participants to experiment directly with the discussed APIs and tools.
The course also covers and explains the most common and critical programming flaws in the Java language and platform, as well as web-related vulnerabilities. Beyond typical errors made by Java developers, the security vulnerabilities addressed include both language-specific issues and problems arising from the runtime environment. All vulnerabilities and associated attacks are illustrated through accessible exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Gain an understanding of the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and discover how to prevent them
- Understand the security concepts underlying web services
- Acquire the skills to utilize various security features within the Java development environment
- Develop a practical understanding of cryptography
- Comprehend the security solutions offered by Java EE
- Learn about typical coding mistakes and how to avoid them
- Receive information regarding recent vulnerabilities in the Java framework
- Gain practical knowledge in using security testing tools
- Access resources and further readings on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led live training in Slovakia (online or onsite) is designed for system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
Upon completion of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single centralized location.
- Leverage FreeIPA's CLI, Web UI, and RPC interface to establish and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications.
- Integrate FreeIPA with Windows Active Directory.
- Back up, replicate, and migrate a FreeIPA server.
Blockchain: Hyperledger Indy for Identity Management
14 HoursIn this instructor-led live training in Slovakia (online or onsite), participants will learn how to create an Indy-based decentralized identity system.
By the end of this training, participants will be able to:
- Create and manage decentralized, self-sovereign identities using distributed ledgers.
- Enable interoperability of digital identities across domains, applications, and silos.
- Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc.
- Use Indy to enable identity owners to independently control their personal data and relationships.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led live training in Slovakia (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Configure the necessary server environment to start setting up authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for system administrators who want to use OpenDJ to manage their organization's user credentials in a production environment.
Upon completion of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server by monitoring, troubleshooting, and optimizing performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.