Get in Touch

award icon svg Certificate

Course Outline

DOMAIN 1: CYBERSECURITY CONCEPTS

  • 1.1 Understanding of information assurance (IA) principles used to manage risks associated with the use, processing, storage, and transmission of information or data.
  • 1.2 Understanding of security management.
  • 1.3 Understanding of risk management processes, including steps and methods for assessing risk.
  • 1.4 Understanding of the organization’s enterprise information technology (IT) goals and objectives.
  • 1.5 Understanding of various operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], and third generation [nation state sponsored]).
  • 1.6 Understanding of information assurance (IA) principles and organizational requirements relevant to confidentiality, integrity, availability, authentication, and non-repudiation.
  • 1.7 Understanding of common adversary tactics, techniques, and procedures (TTPs) in the assigned area of responsibility (e.g., historical country-specific TTPs, emerging capabilities).
  • 1.8 Understanding of different attack classes (e.g., passive, active, insider, close-in, distribution).
  • 1.9 Understanding of relevant laws, policies, procedures, and governance requirements.
  • 1.10 Understanding of relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure.

DOMAIN 2: CYBERSECURITY ARCHITECTURE PRINCIPLES

  • 2.1 Understanding of network design processes, including security objectives, operational objectives, and trade-offs.
  • 2.2 Understanding of security system design methods, tools, and techniques.
  • 2.3 Understanding of network access, identity, and access management (e.g., public key infrastructure [PKI]).
  • 2.4 Understanding of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
  • 2.5 Understanding of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection, and remediation tools and procedures, utilizing standards-based concepts and capabilities.
  • 2.6 Understanding of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defence in depth).
  • 2.7 Understanding of malware analysis concepts and methodology.
  • 2.8 Understanding of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies.
  • 2.9 Understanding of defence in depth principles and network security architecture.
  • 2.10 Understanding of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE]).
  • 2.11 Understanding of cryptology.
  • 2.12 Understanding of encryption methodologies.
  • 2.13 Understanding of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI]).
  • 2.14 Understanding of network protocols (e.g., Transmission Control Protocol and Internet Protocol)

DOMAIN 3: SECURITY OF NETWORK, SYSTEM, APPLICATION AND DATA

  • 3.1 Understanding of computer network defence (CND) and vulnerability assessment tools, including open-source tools, and their capabilities.
  • 3.2 Understanding of basic system administration, network, and operating system hardening techniques.
  • 3.3 Understanding of risks associated with virtualization.
  • 3.4 Understanding of penetration testing principles, tools, and techniques (e.g., Metasploit, NeoSploit).
  • 3.5 Understanding of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • 3.6 Understanding of remote access technology concepts.
  • 3.7 Understanding of systems administration concepts.
  • 3.8 Understanding of the Unix command line.
  • 3.9 Understanding of system and application security threats and vulnerabilities.
  • 3.10 Understanding of system lifecycle management principles, including software security and usability.
  • 3.11 Understanding of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.
  • 3.12 Understanding of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • 3.13 Understanding of the social dynamics of computer attackers in a global context.
  • 3.14 Understanding of secure configuration management techniques.
  • 3.15 Understanding of the capabilities and applications of network equipment, including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
  • 3.16 Understanding of communication methods, principles, and concepts that support network infrastructure.
  • 3.17 Understanding of common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications.
  • 3.18 Understanding of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Local Area Network [WLAN], Wireless Wide Area Network [WWAN]).
  • 3.19 Understanding of virtualization technologies and virtual machine development and maintenance.
  • 3.20 Understanding of application vulnerabilities.
  • 3.21 Understanding of information assurance (IA) principles and methods that apply to software development.
  • 3.22 Understanding of risk threat assessment.

DOMAIN 4: INCIDENT RESPONSE

  • 4.1 Understanding of incident categories, incident responses, and timelines for responses.
  • 4.2 Understanding of disaster recovery and continuity of operations plans.
  • 4.3 Understanding of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.
  • 4.4 Understanding of incident response and handling methodologies.
  • 4.5 Understanding of security event correlation tools.
  • 4.6 Understanding of investigative implications of hardware, operating systems, and network technologies.
  • 4.7 Understanding of processes for seizing and preserving digital evidence (e.g., chain of custody).
  • 4.8 Understanding of types of digital forensics data and how to recognize them.
  • 4.9 Understanding of basic concepts and practices of processing digital forensic data.
  • 4.10 Understanding of anti-forensics tactics, techniques, and procedures (TTPs).
  • 4.11 Understanding of common forensic tool configuration and support applications (e.g., VMware, Wireshark).
  • 4.12 Understanding of network traffic analysis methods.
  • 4.13 Understanding of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find them.

DOMAIN 5: SECURITY OF EVOLVING TECHNOLOGY

  • 5.1 Understanding of new and emerging information technology (IT) and information security technologies.
  • 5.2 Understanding of emerging security issues, risks, and vulnerabilities.
  • 5.3 Understanding of risks associated with mobile computing.
  • 5.4 Understanding of cloud concepts around data and collaboration.
  • 5.5 Understanding of risks associated with moving applications and infrastructure to the cloud.
  • 5.6 Understanding of risks associated with outsourcing.
  • 5.7 Understanding of supply chain risk management processes and practices.

Requirements

There are no specific prerequisites for attending this course

 28 Hours

Testimonials (4)

Upcoming Courses

Related Categories