By the end of this training course, trainees will able to:
- Define cybersecurity.
- Describes objectives of cybersecurity.
- Identify the key components of cybersecurity architecture.
- Identify security tools and hardening techniques.
- Describe different classes of attacks.
- Define types of incidents including categories, responses and timelines for response.
- Discuss new and emerging TI and IS technologies.
- Cybersecurity professionals with experience up to (2) years.
- Security and IT auditors.
- Compliance.
- Anybody interested in gaining the foundation knowledge about cybersecurity.
- Introduction to Cybersecurity.
- Cybersecurity objectives.
- Cybersecurity roles.
- Differences between Information Security and Cybersecurity.
- Cybersecurity Principles.
- Confidentiality, integrity and availability .
- Authentication and nonrepudiation.
- Information Security (IS) within Lifecycle Management.
- Lifecycle management landscape.
- Security architecture processes.
- Security architecture tools.
- Intermediate lifecycle management concepts .
- Risks and Vulnerabilities.
- Basics of risk management.
- Operational threat environments.
- Classes of attacks.
- Incident Response.
- Incident categories.
- Incident response.
- Incident recovery.
- Future Implications and Evolving Technologies.
- New and emerging IT and IS technologies.
- Mobile security issues, risks and vulnerabilities.
- Cloud concepts around data and collaboration.