This course is designed for Cybersecurity Operation Managers® and Cybersecurity Infrastructure Experts® who are in charge of planning cybersecurity technology roadmaps. The CSTP® course unwraps the true essence of technologies in and around the application and the application ecosystem. The new trends, recommendations, and the cybersecurity components that possess the finest design and selection criteria most suitable to protect the application and its ecosystem, save costs, increase efficiency, lower risks, and offer sustainable and optimum features. Various technologies from each category are showcased and compared with the available alternatives, legacy systems and other technology routes that differ based on the solution design and strategic planning of every application ecosystem.


Become CSTP® Certified


Who should take this course?


Cyber Security Professionals including but not limited to, Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptographer, Cryptanalyst, Security Consultant and also Application Developers, Finance Professionals, Data Center Designers/Engineers, Data Center Planners, Project Managers, Legal & Compliance Professionals, College Students & Graduates and Business Continuity Experts.


What you study?


The course explores the new trends, recommendations, and the cybersecurity technology components that possess the finest design and selection criteria most suitable to each of the Application Ecosystem Layers (AE).


Learning Outcomes


Learn how to select and cyber security technology products, Learn how to differentiate between different cyber security technologies, Learn about the best cyber security technologies to each AE layer, Become a cyber security expert in specifying and choosing the right mix of technology products to meet your cyber security needs, Understand the pros and cons of each technology and Observe the influence of cyber security technologies on application design and network design beyond the perimeter


CSIS® Syllabus


Day 1Cyber Security Technology Professional (CSTP) ®

Network Security Systems Technologies
  • Network Access Control
  • ZTNA (Zero Trust Network Access) as a Service
  • Network Detection and Response (NDR)
  • Unified Threat Management (UTM)
  • Microsegmentation Software
  • Firewalls
  • Intrusion Detection and Prevention Software
  • SSL/TLS Decryption
  • Firewall Security Management
  • Advanced Threat Protection
  • IoT Security

Day 2Cyber Security Technology Professional (CSTP)®

Enterprise Networking Technologies
  • Network Virtualization
  • Wireless LAN
  • Wireless WAN
Application Security Technologies
  • Application Security
  • Software Configuration Management
  • Patch Management

Day 3Cyber Security Technology Professional (CSTP)®

Security Software Technologies
  • Endpoint Detection and Response (EDR)
  • Web Content Filtering
  • Identity Management (IM)
  • Enterprise Password Managers

IDCA Course Modules

IDCA offers a wide range of educational professional training programs geared specifically to the Cyber Security: