OneSource Professional Training Solutions, Inc.
presents
Cybersecurity Foundations On-Site Training
Cybersecurity Foundations
Course Description/Agenda
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training. What You'll Learn
- Current cyber threats and cybersecurity site references
-
Government-mandated directives and compliance requirements
-
Cyber roles required to successfully design secure systems
-
The attack cycle perpetrated by malicious hackers
-
Enterprise policy requirements
-
Best strategies for securing the enterprise with layered defenses
-
How security zones and detailed logging augment information assurance
-
Forensic challenges and incident response planning
-
Risk management process
-
Goals achievable with auditing, scanning, and testing systems
-
Industry recommendations for maintaining secure access control
-
Standards-based cryptographic solutions for securing communications
Who Should Attend Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants Course Prerequisites TCP/IP Networking or equivalent knowledge Course Outline 1. Cybersecurity Introduction, Job Roles, and Functions
-
Security Fundamentals
-
Security Importance
-
Human Influence
-
Vulnerabilities
-
Typical Attack Sequence
-
Social Engineering
-
Footprinting
-
Well-Known Parts
-
Port Scanning
- Password/Passphrase Vulnerabilities
-
Track Covering
2. Social Media Concerns
-
Social Media
-
Types
-
Vulnerabilities
-
Social Networking Sites
-
Social Engineering
-
Phishing
-
Online Attacks
-
Statistical Data
-
Security Breach Sources
3. Cyber Awareness
-
CNCI
-
Definition and Purpose of CNCI
-
CNCI Initiative Details
-
Legalities
-
Laws and Rules
-
Legal Compliance
-
Cyber Attacks
-
Malware
-
Viruses
-
Worms
-
Logic Bombs
-
Botnet
-
Trojan Horse
-
OSI Model
-
DNS
4. Cyber Services
-
Cyber Threats
-
Denial of Service Vulnerabilities
-
Server Hardening
-
Web Server Hardening
-
Mail Server Hardening
-
FTP Server Hardening
-
DNS Server Hardening
-
Other Servers
-
Workstation Considerations
-
Network Appliances
-
Wireless Access Hardening
-
VLAN Security
-
Software Attacks
5. Risk Management and Assessment
-
Risk Management
-
Risk Management Process
-
Steps
-
ALE Formula
-
CRAMM Process
-
Risk Management Lifecycle
-
Protected Assets
-
CIA Triad
-
Threat Determination Process
-
Risk Assessment
-
Scenarios
-
Criticality
-
Prioritization
-
Risk Management Lifecycle
-
Steps
-
Policy
-
Assessment
-
Baselines and ePolicy
-
Vulnerabilities
-
Vulnerability Categories
-
Self-Assessment
-
Weak Links in Security
-
Technical Controls
-
Due Care
-
Insurance against Losses
6. Security Policy Management
-
Security Policies
-
Security Policy Definition
-
Security Policy Use
-
Security Policy Importance
-
Legal Issues
-
Policy Example
-
Policy References
-
Policies, Guides, Standards, Procedures, and Controls
-
Coverage Matrix
-
Preparing a Coverage Matrix
-
Example Security Coverage Matrix
-
Granular View of a Security Matrix
-
Basic Policies
7. Vulnerability Assessment and Tools
-
Vulnerability Testing
-
Penetration Testing
-
Risks of Penetration Testing
-
Methodologies
-
Testing
-
Technology Testing Tools
8. Business Continuity Planning
-
Disaster Types
-
Disaster Recovery Plan
-
Goals
-
Steps for Creation
-
Contents
-
Design Requirements
-
Priorities
-
Recovery Strategies
-
High Availability Considerations
-
Data Collection
-
Written Plan Documentation
-
Plan Testing Sequence
-
Business Continuity Planning
-
Business Continuity Planning Process
-
BCP Process Steps
-
Controls
9. Host Security
-
Types of Hosts
-
General Configuration Guidelines
-
Clean Systems
-
Unnecessary Services
-
Rules to Follow
-
Warning Banners
-
Limiting Access
-
Administrators
-
Users
-
Configuring and Logging
-
Security Patches
-
Security Baselines
-
Monitoring
10. Architectural Integration
-
General Security Integration
-
Services
-
Security Zones
-
Filtering
-
Screened Subnets
-
Trusted Zones
-
Devices
|
Add to favorites
Email this page
|