This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSES®. This course provides a comprehensive understanding of cybersecurity architecture, cryptography and secure communications, the overall design as well a good understanding of 5G network and the role of cybersecurity. How to leverage engineering in cybersecurity to address risk associated with the application and data is adequately addressed. It covers the security consideration for the Application Ecosystem and its 7 layers - adequately securing the application.

 

Become CSIE® Certified

 
 
 

Who should take this course?

 
 
 

Cyber Security Professionals including but not limited to, Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptographer, Cryptanalyst, Security Consultant and also Application Developers, Finance Professionals, Data Center Designers/Engineers, Data Center Planners, Project Managers, Legal & Compliance Professionals, College Students & Graduates and Business Continuity Experts.

 
 
 

What you study?

 
 
 

The course provides comprehensive coverage of the Cybersecurity Architecture History & Overview, Cybersecurity Architecture Governance, Reference Security Architecture, Cybersecurity Architecture Strategy, Cybersecurity Architecture Design Document, Cybersecurity Architecture & Operations, Cybersecurity Architecture Practical Designs, Intrusion Detection/Penetration System, Cybersecure Communications, Public Cryptography & Key Infrastructure Certificates, Secure Socket Layer (SSL) & Transport Layer Security (TLS) Protocols, cybersecurity considerations for the 7- layers of the Application Ecosystem, 5G network security, trends in cybersecurity architecture technology and the future of cybersecurity architecture.

 
 
 

Learning Outcomes

 
 
 

Learn how to design cyber security solutions, Learn cyber security best practices to keep the whole system cyber safe, e.g. Application Security, Learn to design and engineer robust cyber security architectures and approaches, e.g. defense in-depth, layered security, security-by-design, resilience-by-design and Learn cyber security principles beyond the CIA Triads.

 
 
 

CSIE® Syllabus

 
 
 

Day 1Cyber Security Infrastructe Specialist (CSIS) ®

Introduction And Overview
  • The outset of Cybersecurity
  • Governance
  • Risk Integration
  • Legislative Requirement
  • Security Requirement
  • Internal Threats
  • External Threats
  • Physical Security Threats
  • Cybercrime: Leading Business Risk Globally
  • Major Cyber Breaches
  • Cybersecurity Complexity
  • Infinity Paradigm
  • Definition of Cybersecurity
  • Cybersecurity Principles
Cybersecurity Principles
  • The Layers
  • The Four Principles
  • Principle 1 & its key Activities
  • Principle 2 & its key Activities
  • Principle 3 & its key Activities
  • Principle 4 & its key Activities
Cybersecurity Dimensions: Attack & Defense
  • Cybersecurity Attack
  • Security Threat to Networks
  • Two types of Attacks
  • Stages of an Attack
  • Cybersecurity Defense
  • Layered Security & Configuration of Perimeter
  • Firewall
  • Intrusion Detection & Penetration System
Cybersecurity Risk & Consequences
  • Consequences of Attack
  • Maturity
  • Culture Shift
  • Appetite
  • Advice
  • Putting a Price on Risk

Day 2Cyber Security Infrastructe Specialist (CSIS)®

Cybersecurity Trends
  • Understanding the threat landscape
  • Common Threat Agents and Vulnerabilities
  • Zero-Day Vulnerabilities
  • Attributes of Cyber Attack
  • Understanding the attributes of an Attack
  • Malware & Types of attack
  • Obfuscation and Mutations in Malware
Network Access Control & Wireless Network Security
  • An Overview of Network Access Control (NAC)
  • NAC Policies
  • The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent
  • The Enforcement Points
  • Enforcement Point Action
  • Authentication and Authorization
  • NIST & Cybersecurity
  • ISO 27001 For Information Security
Weaknesses of Existing Cybersecurity Standards
  • Available standards
  • Weaknesses of existing standards
  • Why IDCA is critical to filling the gaps
Cybersecurity in Cloud
  • Types of Cloud Assets
  • Compute Assets
  • Storage Assets
  • Network Assets
  • Asset Management Pipeline
  • Procurement Leaks
  • Processing Leaks
  • Finding Leaks
  • Protecting data in the cloud
  • Tokenization
  • Encryption
Cybersecurity for IoT and Edge/or 5G Computing
  • IoT Security Challenges & Landscape
  • Why IoT Security devices are targeted
  • Edge Motivation
  • Edge Definition
  • Evolution of IT Computing Models
  • Advantages of Edge Computing
  • Edge Layered Stack
  • OWASP (Open Web Application Security Project) Top 10 Internet of Things
Examination

Day 3Cyber Security Engineering Specialist (CSES)®️

Cybersecurity Architecture History & Overview
  • Five Principles for Design of Cybersecurity Systems
  • Before Designing a system, the Context must be Established
  • Make it very Difficult for Attackers to Compromise your AE
  • The Design Must Make AE Downtime Very Difficult to Occur
  • Being Able to Detect Attacks
  • Reduce the Impact Should an Attack Occur
Application Security Architecture
  • The Application Ecosystem
  • Application Security
  • Application Architecture
  • TOGAF Security Architecture Phases
  • SABSA Secure Application Development
  • Application Security Architecture Governance
  • Application Architecture Security Checklist
Operating Systems & Virtualization
  • Overview
  • Attacker Model
  • Operating System Role and its Security Design Considerations
Symmetric Key Ciphers & Wireless LAN Security
  • Overview
  • Block Ciphers
  • The Feistel Function in a DES Operation
  • Triple DES (3DES)
  • AES Encryption and why it was Developed
  • 128vs129vs256-Bit AES
  • Security Challenges with AES
  • Confidentiality Modes
  • Stream Cipher
  • WLAN Security Journey
  • Wi-Fi Protected Setup (WPS)

Day 4Cyber Security Engineering Specialist (CSES)®️

Hash & Authentication
  • Overview
  • Hash Function Properties
  • Authentication
  • Hash Function Properties
  • Hash Function History
  • Issues with SHA2
  • Migration to SHA-3
  • Hash Message Authentication Code (HMAC)
  • Key Derivation Function (KDF) & Pseudorandom Function (PRF)
  • Authentication Based Password
  • Dictionary Attack
  • Malware Password Cracking Technique
  • Unix Encrypted Password System
  • UNIX/LINUX Password Hash
  • The MD-5 Based Scheme
  • SSHA Scheme
  • Automated Password Generator
  • Online Authentication
  • One-Time Password (OTP) & Token
  • SecurID Simple Authentication & Security (SASL)
  • HMAC-Based One-Time Password (HOTP)
  • Cryptographic Token Initialization
Data Encryption
  • Overview
  • The Need for Data Encryption
  • Case Study
  • Mathematical Introduction to Cryptography
  • Classical Cryptography
  • Euclidean Algorithm
  • Modular Arithmetic
Public Key Cryptographic Infrastructure and Certificates
  • Overview
  • The Need for Data Encryption
  • Case Study
  • Mathematical Introduction to Cryptography
  • Classical Cryptography
  • Euclidean Algorithm
  • Modular Arithmetic
Data Protection: Using Transport Layer Security
  • About TLS
  • Deploying TLS for Web Servers
  • TLS Secure Configuration Recommended
  • Protecting Mail Servers with TLS
  • Choosing Certificate Authority
  • CA Choice
  • Testing
  • TLS Recommended Cryptographic Profiles

Day 5Cyber Security Engineering Specialist (CSES)®️

Transport Layer Security v1.3
  • TLS 1.2 vs TLS1.3 – How they differ
  • Removed Algorithms and Ciphers
  • Faster and Refined Handshake
  • AEAD Bulk Encryption
  • Simplified Ciphers Suites
  • Support
  • Upgrade
  • Troubleshooting Common Errors
  • Running Old Versions
Virtual Private Networks for Network Layer Security
  • Network Security Overview
  • Internet Protocol Security (IPSec)
  • IPSec Services
  • IPSec Modes
  • Security Association
  • The Encapsulating Security Protocol (ESP)
  • The Authentication Header
  • Anti-Replay Service
  • The internet Key Exchange (IKE)
Hardware Security
  • Hardware Design Process Brief Overview
  • Trust Root
  • Threat Model
  • Hardware Security Measurement
  • IoT Platforms Security Evaluation Standard
  • Secure Platform
  • Secure Element and Smartcard
  • Trusted Platform Module
Web & Mobile Security
  • Security Challenges
  • Background
  • Web & Mobile Ecosystem
  • Appification
  • OWASP Top 10 Mobile Security Risk unpacked
  • Exams
Examination
 
 
 

IDCA Course Modules

 
 
 
IDCA offers a wide range of educational professional training programs geared specifically to the Cyber Security: