Ed Skills

Home < Courses < Basics of Cybersecurity

Basics of Cybersecurity

The ISAC Certified Basic Information Security (ICBIS) program is designed to equip students,
and professionals aspiring to start a technical career in cyber security.

Teacher

Keny White

OVERVIEW

The ISAC Certified Basic Information Security (ICBIS) program is designed to equip students, and professionals aspiring to start a technical career in cyber security. This is a foundation technical program that is considered essential to launch into the exciting world of Cyber Security. The course provides a foundational understanding of key concepts, principles, and practices in information security. Participants will explore fundamental topics such as confidentiality, integrity, availability, risk management, and cybersecurity best practices.

Course Objectives

  1. Understand the fundamental principles and concepts of information security.
  2. Identify common threats and vulnerabilities affecting information systems and assets.
  3. Learn about risk management principles and techniques for assessing and mitigating security risks.
  4. Gain proficiency in implementing basic security controls and best practices to protect information assets.
  5. Explore the legal and regulatory frameworks governing information security and privacy.
  6. Develop skills in incident detection, response, and reporting.
  7. Understand the importance of security awareness and training in promoting a culture of security within organizations.
  8. Learn cyber security basics practically with Cyberange Virtual Labs.

Course Outline

Definitions of Cyber Security and Information Security, Difference between CS & IS, Common terms used in CS, Cyber security structure in organization, Risk management.

7 layers of CS, Vulnerability types.

Malware and its types, Attacks and Classification of attacks, How does exploits work, preventive methods against exploits.

Definition, features and benefits of DLP, IDS & IPS, Key Differences, Integration and collaboration.

Overview of honeypots, Purpose of honeypots, Types of honeypots.

Definition and purpose of PT, Types of PT, PT Methodology, Reporting and Mediation, Continuous Testing & Improvement.

Types of Threats/Actors, Threat Profiling, Advanced Persistent Threats, Reverse Engineering.  

DevOps vs DevSecOps, Advantages and Dis-advantages of Cloud, Types of Cloud computing services, Virtual computing.

Definition and concept of IoT, Key components of IoT, Applications and Use Cases, Challenges in IoT, Protect IoT Devices, Device Security (Data, Network)

Network Security – Encryption, Network Segmentation, Firewalls and IDS/IPS. 

Mobile Device Security, Mobile Application Security, Mobile Device Firewall / VPNs, Data Security in Mobile, Secure communication, MFA, SSO, Mobile Identity Management. 

Key legal principles and concepts related to cybercrime, Compliance and Standards, Data protection and privacy law, International and National Laws.

Course Outcome

  1. Understanding of Basic concepts in information and cyber security.
  2. A practical view of the subjects covered with Cyberange Virtual Labs.
  3. Knowledge of Industry-level cyber operations, laws, policies and frameworks.
  4. Explain fundamental concepts such as confidentiality, integrity, and availability in the context of information security.
  5. Identify common threats, vulnerabilities, and attack vectors targeting information systems and assets.
  6. Apply risk management principles to assess security risks, prioritize mitigation efforts, and develop risk treatment plans.
  7. Navigate legal and regulatory requirements related to information security and privacy, ensuring compliance with relevant laws and standards.
  8. Ability to Identify and respond to security incidents.
  9. Skills to assume entry-level positions in Security Operations like Cybersecurity analyst, Cybersecurity Engineer, Cybersecurity Consultant and many more.

Register Now

    Course Features

    Scroll to Top