0% found this document useful (0 votes)
53 views8 pages

Cyber Security Course Content

The cybersecurity course covers a wide range of topics including cybersecurity fundamentals, concepts, roles, domains, policies, security architecture principles, controls, risk assessments, networks, systems, applications, data security, incident response, forensics, disaster recovery, implications of new technologies, and threats. The course uses a combination of introductions, overviews, activities and discussions to educate students on cybersecurity.

Uploaded by

Pavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views8 pages

Cyber Security Course Content

The cybersecurity course covers a wide range of topics including cybersecurity fundamentals, concepts, roles, domains, policies, security architecture principles, controls, risk assessments, networks, systems, applications, data security, incident response, forensics, disaster recovery, implications of new technologies, and threats. The course uses a combination of introductions, overviews, activities and discussions to educate students on cybersecurity.

Uploaded by

Pavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Cyber Security Course

Cybersecurity Fundamentals  • Cybersecurity roles 


o Governance, risk management, & compliance 
Course Schedule- Topics & Activities  o What does a Cybersecurity professional do? 
o Information Security roles 
Cybersecurity Introduction & Overview  o Board of Directors 
o Executive management 
• Introduction to Cybersecurity  o Senior Information security management 
o The evolution of Cybersecurity 
o Cybersecurity practitioners 
o Cybersecurity & situational awareness 
o The Cybersecurity skills gap
• Cybersecurity domains 
  o Cybersecurity concepts 
• Difference between Information Security & o Security architecture principles 
Cybersecurity  o Security of networks, systems, applications, &
o Protecting digital assets 
data 
o Incident response 
• Cybersecurity objectives  o Security implications & adoption of evolving
o Confidentiality, integrity, & availability 
technology 
o Nonrepudiation 
Cybersecurity Concepts
o Policy life cycle 
o Guidelines 
• Risk  o Policy frameworks 
o Approaches to Cybersecurity  o Types of Information Security policies 
o Key terms & definitions  o Access control policy 
o Likelihood & impact  o Personnel Information Security policy 
o Approaches to risk  o Security incident response policy 
o Third-party risk 
o Risk management • Cybersecurity controls 

o Identity management 
• Common attack types & vectors  o Provisioning & de-provisioning 
o Authorization 
o o Access control lists 
Threat agents 
o o Privileged user management 
Attack attributes 
o o Change management 
Generalized attack process 
o o Configuration management 
Non adversarial threat events 
o o Patch management 
Malware & attack types 

 
• Policies & procedures 
Security Architecture Principles 
• Isolation & segmentation 
• Overview of security architecture  o VLANs 
o The security perimeter  o Security zones & DMZs 
o Interdependencies 
o Security architectures & frameworks  • Monitoring, detection, and logging 
o SABSA & the Zachman framework  o Ingress, egress, & data loss prevention (DLP) 
o The open group architecture framework (TOGAF) o Antivirus & anti-malware 
  o Intrusion detection systems 
• The OSI model  o IDS limitations 
o TCP/IP  o IDS policy 
o Intrusion prevention systems 
• Defense in Depth 
• Cryptography Fundamentals 
• Firewalls  o Key elements of cryptographic systsms 
o Firewall general features  o Key systems 
o Network firewall types   
o Packet filtering firewalls 
o Stateful inspection firewalls 
o Stateless vs. stateful 
o Examples of firewall implementations 
o Firewall issues 
o Firewall platforms 
• Encryption techniques  o Risk assessment success criteria 
o Symmetric (private) key encryption  o Managing risk 
o Asymmetric (private) key encryption  o Using the results of the risk assessment 
o Elliptical curve cryptography 
o Quantum cryptography  • Process controls – vulnerability management 
o Advanced encryption standard  o Vulnerability management 
o Digital signature  o Vulnerability scans 
o Virtual private network  o Vulnerability assessment 
o Wireless network protections  o Remediation 
o Stored data  o Reporting & metrics 
o Public key infrastructure 
• Process controls – penetration testing 
• Encryption applications  o Penetration testers
o Applications of cryptographic systems o Penetration testing phases  

Security of Networks, Systems, Applications, & Data 

• Process controls – risk assessments 


o Attributes of risk 
o Risk response workflow 
o Risk analysis 
o Evaluating security controls 
• Network security 
o Network management  • Application security 
o LAN/WAN security  o System development life cycle (SDLC) 
o Network risks  o Security within SDLC 
o Wireless local area networks  o Design requirements 
o Wired equivalent privacy & Wi-Fi protected o Testing 
access (WPA/WPA2)  o Review process 
o Ports & protocols  o Separation of development, testing, & production
o Port numbers  environments 
o Protocol numbers & assignment services  o OWASP top ten 
o Virtual private networks  o Wireless application protocol (WAP)
o Remote access 

• Operating system security • Data security 


o System/platform hardening  o Data classification 
o Modes of operations  o Data owners 
o o File system permissions  o Data classification requirements 
o o Credentials & privileges  o Database security 
o o Command line knowledge 
o o Logging & system monitoring 
o o Virtualization 
o o Specialized systems 
Incident Response  o Ingestion/normalization 
o Reporting 
• Event vs. incident  o Network traffic analysis 
o Events vs. incident  o Log file analysis 
o Types of incidents  o Time lines 
o Anti-forensics 
• Security incident response 
o What is incident response?  • Disaster recovery & business continuity plans 
o Why do we need incident response?  o What is a disaster? 
o Elements of an incident response plan  o Business continuity & disaster recovery 
o Security event management  o Business impact analysis 
o Recovery time objectives (RTO) 
• Investigations, legal holds, & preservation  o Recover point objective (RPO) 
o Investigations  o IS business continuity planning 
o Evidence preservation  o Recovery concepts 
o Legal requirements  o Backup procedures 

• Forensics 
o Data protection 
o Data acquisition 
o Imaging 
o Extraction 
o Interrogation 
Security Implications & Adoption of Evolving
Technology  • Consumerization of IT & mobile devices 
o Consumerization of IT 
• Current threat landscape  o BYOD 
• Advanced persistent threats (APTs) 
o Evolution of the threat landscape  • Cloud & digital collaboration 
o Defining APTs  o Risk of cloud computing 
o APT characteristics  o Web application risk 
o APT targets  o Benefits of cloud computing 
o Stages of an APT attack 

• Mobile technology – vulnerabilities, threats, &


risk 
o Physical risk 
o Organizational risk 
o Technical risk 
o Activity monitoring & data retrieval 
o Unauthorized network connectivity 
o Web view/user interface (UI) impersonation 
o Sensitive data leakage 
o Unsafe sensitive data storage 
o Unsafe sensitive data transmission 
o Drive-by vulnerabilities 

You might also like