NP URI: www.nobleprog.ae/cc/cybok Undefined array key 0 /apps/hitra7/npfrontend/nptemplates/default.php:137 Array ( [0] => Array ( [file] => /apps/hitra7/npfrontend/nptemplates/default.php [line] => 137 [function] => {closure:/apps/hitra7/npfrontend/index.php:5} [args] => Array ( [0] => 2 [1] => Undefined array key 0 [2] => /apps/hitra7/npfrontend/nptemplates/default.php [3] => 137 ) ) [1] => Array ( [file] => /apps/hitra7/npfrontend/modules/course/course.php [line] => 141 [args] => Array ( [0] => /apps/hitra7/npfrontend/nptemplates/default.php ) [function] => require_once ) [2] => Array ( [file] => /apps/hitra7/npfrontend/core/routes.php [line] => 16 [function] => course_menu_callback [args] => Array ( [0] => /cc/cybok ) ) [3] => Array ( [file] => /apps/hitra7/npfrontend/__index.php [line] => 94 [args] => Array ( [0] => /apps/hitra7/npfrontend/core/routes.php ) [function] => require_once ) [4] => Array ( [file] => /apps/hitra7/npfrontend/index.php [line] => 17 [args] => Array ( [0] => /apps/hitra7/npfrontend/__index.php ) [function] => include_once ) [5] => Array ( [file] => /apps/hitra7/index.php [line] => 65 [args] => Array ( [0] => /apps/hitra7/npfrontend/index.php ) [function] => include_once ) ) NP URI: www.nobleprog.ae/cc/cybok Undefined array key 1 /apps/hitra7/npfrontend/nptemplates/default.php:137 Array ( [0] => Array ( [file] => /apps/hitra7/npfrontend/nptemplates/default.php [line] => 137 [function] => {closure:/apps/hitra7/npfrontend/index.php:5} [args] => Array ( [0] => 2 [1] => Undefined array key 1 [2] => /apps/hitra7/npfrontend/nptemplates/default.php [3] => 137 ) ) [1] => Array ( [file] => /apps/hitra7/npfrontend/modules/course/course.php [line] => 141 [args] => Array ( [0] => /apps/hitra7/npfrontend/nptemplates/default.php ) [function] => require_once ) [2] => Array ( [file] => /apps/hitra7/npfrontend/core/routes.php [line] => 16 [function] => course_menu_callback [args] => Array ( [0] => /cc/cybok ) ) [3] => Array ( [file] => /apps/hitra7/npfrontend/__index.php [line] => 94 [args] => Array ( [0] => /apps/hitra7/npfrontend/core/routes.php ) [function] => require_once ) [4] => Array ( [file] => /apps/hitra7/npfrontend/index.php [line] => 17 [args] => Array ( [0] => /apps/hitra7/npfrontend/__index.php ) [function] => include_once ) [5] => Array ( [file] => /apps/hitra7/index.php [line] => 65 [args] => Array ( [0] => /apps/hitra7/npfrontend/index.php ) [function] => include_once ) ) NP URI: www.nobleprog.ae/cc/cybok Undefined array key 2 /apps/hitra7/npfrontend/nptemplates/default.php:137 Array ( [0] => Array ( [file] => /apps/hitra7/npfrontend/nptemplates/default.php [line] => 137 [function] => {closure:/apps/hitra7/npfrontend/index.php:5} [args] => Array ( [0] => 2 [1] => Undefined array key 2 [2] => /apps/hitra7/npfrontend/nptemplates/default.php [3] => 137 ) ) [1] => Array ( [file] => /apps/hitra7/npfrontend/modules/course/course.php [line] => 141 [args] => Array ( [0] => /apps/hitra7/npfrontend/nptemplates/default.php ) [function] => require_once ) [2] => Array ( [file] => /apps/hitra7/npfrontend/core/routes.php [line] => 16 [function] => course_menu_callback [args] => Array ( [0] => /cc/cybok ) ) [3] => Array ( [file] => /apps/hitra7/npfrontend/__index.php [line] => 94 [args] => Array ( [0] => /apps/hitra7/npfrontend/core/routes.php ) [function] => require_once ) [4] => Array ( [file] => /apps/hitra7/npfrontend/index.php [line] => 17 [args] => Array ( [0] => /apps/hitra7/npfrontend/__index.php ) [function] => include_once ) [5] => Array ( [file] => /apps/hitra7/index.php [line] => 65 [args] => Array ( [0] => /apps/hitra7/npfrontend/index.php ) [function] => include_once ) )

Course Outline

Introduction

  • Overview of Cyber Security concepts and definition
  • Understanding the CyBOK knowledge areas (KAs)
  • Implementing CyBOK knowledge to address security issues

Human, Organisational, and Regulatory Aspects

  • Risk management and governance
  • Law and regulation
  • Human factors
  • Privacy and online rights

Attacks and Defences

  • Malware and attack technologies
  • Adversarial behaviors
  • Security operations and incident management
  • Forensics

Systems Security

  • Cryptography
  • Operating systems and virtualisation
  • Distributed systems security
  • Formal methods for security
  • Authentication, authorization, and accountability

Software Platform and Security

  • Software security
  • Web and mobile security
  • Secure software lifecycle

Infrastructure Security

  • Applied cryptography
  • Network security
  • Hardware security
  • Cyber-physical systems security
  • Physical layer and telecommunications security

Summary and Next Steps

Requirements

  • Basic understanding of cyber security and software engineering

Audience

  • Software engineers
  • IT professionals
 35 Hours

Testimonials (2)

Upcoming Courses

Related Categories