This course is fundamental for professionals with varied disciplines and positions. Application and Business Security stakeholders, cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSIS® to enrich their knowledge beyond the industry buzzwords. The CSIS® course provides end-to-end coverage of the cybersecurity concepts, fundamentals, components, infrastructure, standards, disciplines, latest trends and best practices to support the integrity and security of the Application Ecosystem (AE)®.
Who should take this course?
Cyber Security Professionals including but not limited: Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptographer, Cryptanalyst, Security Consultant. Furthermore this course is suitable for Application Developers, Finance Professionals, Data Center Designers/Engineers, Data Center Planners, Project Managers, Legal & Compliance Professionals, College Students & Graduates, Business Continuity Experts.
The course will provide comprehensive coverage of the main Cybersecurity concepts, components, principles, standards, Cyber Security technology trends and advancements, the application of Cybersecurity practice to the security and integrity of the Application Ecosystem® and latest trends, enabling professionals to make the most appropriate Cyber Security choices for design, build and operation of a resilient enterprise or product that is secure by design.
Learn the Cybersecurity language and buzzwords. Learn Cybersecurity principles. Understand Cybersecurity Threat Landscape. Review Cybersecurity standards and frameworks. Learn how to cybersecure the Application Ecosystem (AE).
-
Introduction And Overview
-
The outset of Cybersecurity
Governance
Risk Integration
Legislative Requirement
Security Requirement
Internal Threats
External Threats
Physical Security Threats
Cybercrime: Leading Business Risk Globally
Major Cyber Breaches
Cybersecurity Complexity
Infinity Paradigm
Definition of Cybersecurity
Cybersecurity Principles
-
Cybersecurity Principles
-
The Layers
The Four Principles
Principle 1 & its key Activities
Principle 2 & its key Activities
Principle 3 & its key Activities
Principle 4 & its key Activities
-
Cybersecurity Dimensions: Attack & Defense
-
Cybersecurity Attack
Security Threat to Networks
Two types of Attacks
Stages of an Attack
Cybersecurity Defense
Layered Security & Configuration of Perimeter
Firewall
Intrusion Detection & Penetration System
-
Cybersecurity Risk & Consequences
-
Consequences of Attack
Maturity
Culture Shift
Appetite
Advice
Putting a Price on Risk
-
Cybersecurity Trends
-
Understanding the threat landscape
Common Threat Agents and Vulnerabilities
Zero-Day Vulnerabilities
Attributes of Cyber Attack
Understanding the attributes of an Attack
Malware & Types of attack
Obfuscation and Mutations in Malware
-
Network Access Control & Wireless Network Security
-
An Overview of Network Access Control (NAC)
NAC Policies
The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent
The Enforcement Points
Enforcement Point Action
Authentication and Authorization
NIST & Cybersecurity
ISO 27001 For Information Security
-
Weaknesses of Existing Cybersecurity Standards
-
Available standards
Weaknesses of existing standards
Why IDCA is critical to filling the gaps
-
Cybersecurity in Cloud
-
Types of Cloud Assets
Compute Assets
Storage Assets
Network Assets
Asset Management Pipeline
Procurement Leaks
Processing Leaks
Finding Leaks
Protecting data in the cloud
Tokenization
Encryption
-
Cybersecurity for IoT and Edge/or 5G Computing
-
IoT Security Challenges & Landscape
Why IoT Security devices are targeted
Edge Motivation
Edge Definition
Evolution of IT Computing Models
Advantages of Edge Computing
Edge Layered Stack
OWASP (Open Web Application Security Project) Top 10 Internet of Things
-
Examination
IDCA offers a wide range of educational professional training programs geared specifically to the Cyber Security: