Chat with us, powered by LiveChat
0 items - $0.00
  • Your Shopping cart is empty.

Cybersecurity Foundations

Cybersecurity Foundations

Duration: 5 Days
Learning Formats:
Virtual Classroom: $2,749
Classroom: $2,749

Enrollment & Exam Options

Classroom and Virtual

Product Description

In this Cybersecurity Foundations course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. The Cybersecurity Foundations course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.

AUDIENCE

The Cybersecurity Foundations course will be of interest to cybersecurity professionals including:

Security Analysts

Intel Analysts

Policy Analysts

Security Operations Personnel

Network Administrators

System Integrators

VARS

Security Consultants

LEARNING OBJECTIVES

Upon successful completion of the education and examination components related to this qualification, candidates can expect to gain competencies in the following:

Current cyber threats and cybersecurity site references

Government-mandated directives and compliance requirements

Cyber roles required to successfully design secure systems

The attack cycle perpetrated by malicious hackers

Enterprise policy requirements

Best strategies for securing the enterprise with layered defenses

How security zones and detailed logging augment information assurance

Forensic challenges and incident response planning

Risk management process

Goals achievable with auditing, scanning, and testing systems

Industry recommendations for maintaining secure access control

Standards-based cryptographic solutions for securing communications

PREREQUISITES

Candidates for this course must have completed the TCP/ICP Networking course or hold equivalent knowledge.