Cyber Security Course Content
Cyber Security Course Content
o Identity management
• Common attack types & vectors o Provisioning & de-provisioning
o Authorization
o o Access control lists
Threat agents
o o Privileged user management
Attack attributes
o o Change management
Generalized attack process
o o Configuration management
Non adversarial threat events
o o Patch management
Malware & attack types
• Policies & procedures
Security Architecture Principles
• Isolation & segmentation
• Overview of security architecture o VLANs
o The security perimeter o Security zones & DMZs
o Interdependencies
o Security architectures & frameworks • Monitoring, detection, and logging
o SABSA & the Zachman framework o Ingress, egress, & data loss prevention (DLP)
o The open group architecture framework (TOGAF) o Antivirus & anti-malware
o Intrusion detection systems
• The OSI model o IDS limitations
o TCP/IP o IDS policy
o Intrusion prevention systems
• Defense in Depth
• Cryptography Fundamentals
• Firewalls o Key elements of cryptographic systsms
o Firewall general features o Key systems
o Network firewall types
o Packet filtering firewalls
o Stateful inspection firewalls
o Stateless vs. stateful
o Examples of firewall implementations
o Firewall issues
o Firewall platforms
• Encryption techniques o Risk assessment success criteria
o Symmetric (private) key encryption o Managing risk
o Asymmetric (private) key encryption o Using the results of the risk assessment
o Elliptical curve cryptography
o Quantum cryptography • Process controls – vulnerability management
o Advanced encryption standard o Vulnerability management
o Digital signature o Vulnerability scans
o Virtual private network o Vulnerability assessment
o Wireless network protections o Remediation
o Stored data o Reporting & metrics
o Public key infrastructure
• Process controls – penetration testing
• Encryption applications o Penetration testers
o Applications of cryptographic systems o Penetration testing phases
• Forensics
o Data protection
o Data acquisition
o Imaging
o Extraction
o Interrogation
Security Implications & Adoption of Evolving
Technology • Consumerization of IT & mobile devices
o Consumerization of IT
• Current threat landscape o BYOD
• Advanced persistent threats (APTs)
o Evolution of the threat landscape • Cloud & digital collaboration
o Defining APTs o Risk of cloud computing
o APT characteristics o Web application risk
o APT targets o Benefits of cloud computing
o Stages of an APT attack