This course is designed for Cybersecurity Operation Managers® and Cybersecurity Infrastructure Experts® who are in charge of planning cybersecurity technology roadmaps. The CSTP® course unwraps the true essence of technologies in and around the application and the application ecosystem. The new trends, recommendations, and the cybersecurity components that possess the finest design and selection criteria most suitable to protect the application and its ecosystem, save costs, increase efficiency, lower risks, and offer sustainable and optimum features. Various technologies from each category are showcased and compared with the available alternatives, legacy systems and other technology routes that differ based on the solution design and strategic planning of every application ecosystem.

 

Become CSTP® Certified

 
 
 

Who should take this course?

 
 
 

Cyber Security Professionals including but not limited to, Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptographer, Cryptanalyst, Security Consultant and also Application Developers, Finance Professionals, Data Center Designers/Engineers, Data Center Planners, Project Managers, Legal & Compliance Professionals, College Students & Graduates and Business Continuity Experts.

 
 
 

What you study?

 
 
 

The course explores the new trends, recommendations, and the cybersecurity technology components that possess the finest design and selection criteria most suitable to each of the Application Ecosystem Layers (AE).

 
 
 

Learning Outcomes

 
 
 

Learn how to select and cyber security technology products, Learn how to differentiate between different cyber security technologies, Learn about the best cyber security technologies to each AE layer, Become a cyber security expert in specifying and choosing the right mix of technology products to meet your cyber security needs, Understand the pros and cons of each technology and Observe the influence of cyber security technologies on application design and network design beyond the perimeter

 
 
 

CSIS® Syllabus

 
 
 

Day 1Cyber Security Technology Professional (CSTP) ®

Network Security Systems Technologies
  • Network Access Control
  • ZTNA (Zero Trust Network Access) as a Service
  • Network Detection and Response (NDR)
  • Unified Threat Management (UTM)
  • Microsegmentation Software
  • Firewalls
  • Intrusion Detection and Prevention Software
  • SSL/TLS Decryption
  • SSL VPN
  • Firewall Security Management
  • Advanced Threat Protection
  • IoT Security
  • Enterprise Infrastructure VPN
Enterprise Networking Technologies
  • Network Virtualization
  • Wireless LAN
  • Wireless WAN
  • WAN Edge
  • Web Security Gateways
Internet Management Technologies
  • Internet Security
  • DNS Security
Security Services Technologies
  • Managed Security Services
  • Customer Identity and Access Management
  • Managed Detection and Response (MDR)
  • Web Application Firewall (WAF)
  • DDoS
  • Privileged Access Management
Application Security Technologies
  • Application Security
  • Software Configuration Management
  • Patch Management

Day 2Cyber Security Technology Professional (CSTP)®

Security Software Technologies
  • Virtualization Security
  • Mobile Identity Solutions
  • Container Security
  • Threat Intelligence Platforms
  • Security Incident Response
  • Directory Servers
  • Active Directory Bridge
  • Digital Asset Security Platforms
  • Extended Detection and Response (XDR)
  • Endpoint Detection and Response (EDR)
  • Cloud Workload Security
  • Mobile Threat Defense
  • Single Sign-On (SSO)
  • Data Loss Prevention
  • Security Information and Event Management (SIEM)
  • Vulnerability Management
  • Endpoint Protection (EPP) for Business
  • Fraud Detection and Prevention
  • Web Content Filtering
  • Identity Management (IM)
  • Endpoint Encryption
  • Mobile Data Protection
  • Cloud Access Security Brokers
  • Access Management
  • Security Orchestration Automation and Response (SOAR)
  • Active Directory Management
  • Secure Access Service Edge (SASE)
  • Enterprise Password Managers
  • User Behavior Analytics - UEBA
  • Cloud and Data Center Security
  • Endpoint Compliance
  • Identity and Access Management as a Service (IDaaS)
  • Anti-Malware Tools

Day 3Cyber Security Technology Professional (CSTP)®

Access Control Technologies
  • Physical Access Control
  • Barriers
  • Bollards
  • Turnstiles and Portals
  • Guard Facilities
Token and Cipher Systems
  • Identification Cards and Badges
  • Keycard Door Systems
  • Cipher Lock
  • Magnetic Stripe Cards
  • Contact Smart Card
  • Contactless Smart Card
  • Wiegand Cards
  • Key Fobs
Biometric Access Control Technologies
  • Facial Recognition
  • Fingerprint Recognition
  • Hand/Finger Geometry Recognition
  • Vascular Pattern Recognition
  • Iris Recognition
  • Retina Scan
  • Voice Recognition
  • Signature Dynamics Recognition
  • Multimodal
Examination
 
 
 

IDCA Course Modules

 
 
 
IDCA offers a wide range of educational professional training programs geared specifically to the Cyber Security: