Cybersecurity Foundations Training
Investigate cybersecurity threats and master techniques needed to protect your network with this Cybersecurity Foundations Training.
In this Cybersecurity Foundations Training course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
In addition to technical Cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This Cybersecurity Foundations Training course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.
Duration: 5 days
RESOURCES
- Cybersecurity Foundations Training – https://www.wiley.com/
- Cybersecurity Foundations Training – https://www.packtpub.com/
- Cybersecurity Foundations Training – https://store.logicaloperations.com/
- Cybersecurity Foundations Training – https://us.artechhouse.com/
- Cybersecurity Foundations Training – https://www.amazon.com/
RELATED COURSES
- Cyber Threats Detection and Mitigation Training
- Cyber Threats Hunting (CCTHP) Training
- Cybersecurity Investigations and Network Forensics Analysis
- Fundamentals of Information Systems Security Training
CUSTOMIZE It
- We can adapt this Cybersecurity Foundations Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Cybersecurity Foundations Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Cybersecurity Foundations Training Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Cybersecurity Foundations Training course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Cybersecurity Foundations Training course:
- Network professionals looking to advance their knowledge and explore cybersecurity as a career path
- Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level
- Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Cybersecurity Foundations Training course are:
- Understanding Networking Fundamentals
- TCP/IP Networking
Cybersecurity Foundations Training - OBJECTIVES
Upon completing this Cybersecurity Foundations Training course, learners will be able to meet these objectives:
- Increase your awareness of security
- Interpret/analyze tool output for network mapping/footprinting
- Reduce attack surface of systems
- Review networking as it applies to security controls
- Explore different data protection principles
- Examine the role of PKI/certificates in building trusted relationships between devices in a network
- Implement login security and other identity management solutions
- Reduce attack surface of network devices
- Explore current malware threats and anti-malware solutions
- Explore social engineering threats, methods, and techniques
- Examine software vulnerabilities and security solutions for reducing the risk of exploitation
- Explain monitoring capabilities and requirements and how those may raise privacy concerns
- Identify physical security controls and the relationship between physical and IT security
- Explain incident response capabilities
- Identify legal considerations and investigative techniques when it comes to cybersecurity
- Research trends in cybersecurity
Cybersecurity Foundations Training - COURSE SYLLABUS
1. Cybersecurity Awareness
- What is security?
- Confidentiality, integrity, and availability
- Security baselining
- Security concerns: Humans
- Types of threats
- Security controls
- What is hacking?
- Risk management
- Data in motion vs. data at rest
- Module review
2. Network Discovery
- Networking review
- Discovery, footprinting, and scanning
- Common vulnerabilities and exposures
- Security policies
- Vulnerabilities
- Module review
3. Systems Hardening
- What is hardening?
- Types of systems that can be hardened
- Security baselines
- How to harden systems
- Hardening systems by role
- Mobile devices
- Hardening on the network
- Analysis tools
- Authentication, authorization, and accounting
- Physical security
- Module review
4. Security Architecture
- Security architecture
- Network devices
- Network zones
- Network segmentation
- Network Address Translation
- Network Access Control
- Module review
5. Data Security
- Cryptography
- Principles of permissions
- Steganography
- Module review
6. Public Key Infrastructure
- Public key infrastructure
- Certification authorities
- Enabling trust
- Certificates
- CA management
- Module review
7. Identity Management
- What is identity management?
- Personally identifiable information
- Authentication factors
- Directory services
- Kerberos
- Windows NT LAN Manager
- Password policies
- Cracking passwords
- Password assessment tools
- Password managers
- Group accounts
- Service accounts
- Federated identities
- Identity as a Service
- Module review
8. Network Hardening
- Limiting remote admin access
- AAA: Administrative access
- Simple Network Management Protocol
- Network segmentation
- Limiting physical access
- Establishing secure access
- Network devices
- Fundamental device protection summary
- Traffic filtering best practices
- Module review
9. Malware
- What is malware?
- Infection methods
- Types of malware
- Backdoors
- Countermeasures
- Protection tools
- Module review
10. Social Engineering
- What is social engineering?
- Social engineering targets
- Social engineering attacks
- Statistical data
- Information harvesting
- Preventing social engineering
- Cyber awareness: Policies and procedures
- Social media
- Module review
11. Software Security
- Software engineering
- Security guidelines
- Software vulnerabilities
- Module review
12. Environment Monitoring
- Monitoring
- Monitoring vs. logging
- Monitoring/logging benefits
- Logging
- Metrics
- Module review
13. Physical Security
- What is physical security?
- Defense in depth
- Types of physical security controls
- Device security
- Human security
- Security policies
- Equipment tracking
- Module review
14. Incident Response
- Disaster types
- Incident investigation tips
- Business continuity planning
- Disaster recovery plan
- Forensic incident response
- Module review
15. Legal Considerations
- Regulatory compliance
- Cybercrime
- Module review
16. Trends in Cybersecurity
- Cybersecurity design constraints
- Cyber driving forces
- How connected are you?
- How reliant on connectivity are you?
- Identity management
- Cybersecurity standards
- Cybersecurity training
17. Course Look Around
- Looking back
- Looking forward
- Planning your journey
LABS
- Lab 1: Explore HR Security
- Lab 2: Interpret Scanning Results
- Lab 3: Harden Servers and Workstations
- Lab:4 Security Architecture
- Lab 5: Protect Data
- Lab 6: Configure a PKI
- Lab 7: Manage Passwords
- Lab 8: Explore Hardening Recommendations and Known Vulnerabilities
- Lab 9: Detect Malware
- Lab 10: Social Engineering
- Lab 11: Privilege Escalation
- Lab 12: Monitor a System
- Lab 13: Implement Physical Security
- Lab 14: Incident Response
- Lab 15: Review Legal Considerations
Cybersecurity Foundations Training Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information