Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Certificate
Course Outline
DOMAIN 1: CYBERSECURITY CONCEPTS
- 1.1 Understanding of information assurance (IA) principles used to manage risks associated with the use, processing, storage, and transmission of information or data.
- 1.2 Understanding of security management.
- 1.3 Understanding of risk management processes, including steps and methods for assessing risk.
- 1.4 Understanding of the organization’s enterprise information technology (IT) goals and objectives.
- 1.5 Understanding of various operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], and third generation [nation state sponsored]).
- 1.6 Understanding of information assurance (IA) principles and organizational requirements relevant to confidentiality, integrity, availability, authentication, and non-repudiation.
- 1.7 Understanding of common adversary tactics, techniques, and procedures (TTPs) in the assigned area of responsibility (e.g., historical country-specific TTPs, emerging capabilities).
- 1.8 Understanding of different attack classes (e.g., passive, active, insider, close-in, distribution).
- 1.9 Understanding of relevant laws, policies, procedures, and governance requirements.
- 1.10 Understanding of relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure.
DOMAIN 2: CYBERSECURITY ARCHITECTURE PRINCIPLES
- 2.1 Understanding of network design processes, including security objectives, operational objectives, and trade-offs.
- 2.2 Understanding of security system design methods, tools, and techniques.
- 2.3 Understanding of network access, identity, and access management (e.g., public key infrastructure [PKI]).
- 2.4 Understanding of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
- 2.5 Understanding of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection, and remediation tools and procedures, utilizing standards-based concepts and capabilities.
- 2.6 Understanding of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defence in depth).
- 2.7 Understanding of malware analysis concepts and methodology.
- 2.8 Understanding of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies.
- 2.9 Understanding of defence in depth principles and network security architecture.
- 2.10 Understanding of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE]).
- 2.11 Understanding of cryptology.
- 2.12 Understanding of encryption methodologies.
- 2.13 Understanding of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI]).
- 2.14 Understanding of network protocols (e.g., Transmission Control Protocol and Internet Protocol)
DOMAIN 3: SECURITY OF NETWORK, SYSTEM, APPLICATION AND DATA
- 3.1 Understanding of computer network defence (CND) and vulnerability assessment tools, including open-source tools, and their capabilities.
- 3.2 Understanding of basic system administration, network, and operating system hardening techniques.
- 3.3 Understanding of risks associated with virtualization.
- 3.4 Understanding of penetration testing principles, tools, and techniques (e.g., Metasploit, NeoSploit).
- 3.5 Understanding of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
- 3.6 Understanding of remote access technology concepts.
- 3.7 Understanding of systems administration concepts.
- 3.8 Understanding of the Unix command line.
- 3.9 Understanding of system and application security threats and vulnerabilities.
- 3.10 Understanding of system lifecycle management principles, including software security and usability.
- 3.11 Understanding of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.
- 3.12 Understanding of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- 3.13 Understanding of the social dynamics of computer attackers in a global context.
- 3.14 Understanding of secure configuration management techniques.
- 3.15 Understanding of the capabilities and applications of network equipment, including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
- 3.16 Understanding of communication methods, principles, and concepts that support network infrastructure.
- 3.17 Understanding of common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications.
- 3.18 Understanding of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Local Area Network [WLAN], Wireless Wide Area Network [WWAN]).
- 3.19 Understanding of virtualization technologies and virtual machine development and maintenance.
- 3.20 Understanding of application vulnerabilities.
- 3.21 Understanding of information assurance (IA) principles and methods that apply to software development.
- 3.22 Understanding of risk threat assessment.
DOMAIN 4: INCIDENT RESPONSE
- 4.1 Understanding of incident categories, incident responses, and timelines for responses.
- 4.2 Understanding of disaster recovery and continuity of operations plans.
- 4.3 Understanding of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.
- 4.4 Understanding of incident response and handling methodologies.
- 4.5 Understanding of security event correlation tools.
- 4.6 Understanding of investigative implications of hardware, operating systems, and network technologies.
- 4.7 Understanding of processes for seizing and preserving digital evidence (e.g., chain of custody).
- 4.8 Understanding of types of digital forensics data and how to recognize them.
- 4.9 Understanding of basic concepts and practices of processing digital forensic data.
- 4.10 Understanding of anti-forensics tactics, techniques, and procedures (TTPs).
- 4.11 Understanding of common forensic tool configuration and support applications (e.g., VMware, Wireshark).
- 4.12 Understanding of network traffic analysis methods.
- 4.13 Understanding of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find them.
DOMAIN 5: SECURITY OF EVOLVING TECHNOLOGY
- 5.1 Understanding of new and emerging information technology (IT) and information security technologies.
- 5.2 Understanding of emerging security issues, risks, and vulnerabilities.
- 5.3 Understanding of risks associated with mobile computing.
- 5.4 Understanding of cloud concepts around data and collaboration.
- 5.5 Understanding of risks associated with moving applications and infrastructure to the cloud.
- 5.6 Understanding of risks associated with outsourcing.
- 5.7 Understanding of supply chain risk management processes and practices.
Requirements
There are no specific prerequisites for attending this course
28 Hours
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects