Basics of Cybersecurity
and professionals aspiring to start a technical career in cyber security.
Teacher
Keny White
OVERVIEW
Course Objectives
- Understand the fundamental principles and concepts of information security.
- Identify common threats and vulnerabilities affecting information systems and assets.
- Learn about risk management principles and techniques for assessing and mitigating security risks.
- Gain proficiency in implementing basic security controls and best practices to protect information assets.
- Explore the legal and regulatory frameworks governing information security and privacy.
- Develop skills in incident detection, response, and reporting.
- Understand the importance of security awareness and training in promoting a culture of security within organizations.
- Learn cyber security basics practically with Cyberange Virtual Labs.
Course Outline
Definitions of Cyber Security and Information Security, Difference between CS & IS, Common terms used in CS, Cyber security structure in organization, Risk management.
7 layers of CS, Vulnerability types.
Malware and its types, Attacks and Classification of attacks, How does exploits work, preventive methods against exploits.
Definition, features and benefits of DLP, IDS & IPS, Key Differences, Integration and collaboration.
Overview of honeypots, Purpose of honeypots, Types of honeypots.
Definition and purpose of PT, Types of PT, PT Methodology, Reporting and Mediation, Continuous Testing & Improvement.
Types of Threats/Actors, Threat Profiling, Advanced Persistent Threats, Reverse Engineering.
DevOps vs DevSecOps, Advantages and Dis-advantages of Cloud, Types of Cloud computing services, Virtual computing.
Definition and concept of IoT, Key components of IoT, Applications and Use Cases, Challenges in IoT, Protect IoT Devices, Device Security (Data, Network)
Network Security – Encryption, Network Segmentation, Firewalls and IDS/IPS.
Mobile Device Security, Mobile Application Security, Mobile Device Firewall / VPNs, Data Security in Mobile, Secure communication, MFA, SSO, Mobile Identity Management.
Key legal principles and concepts related to cybercrime, Compliance and Standards, Data protection and privacy law, International and National Laws.
Course Outcome
- Understanding of Basic concepts in information and cyber security.
- A practical view of the subjects covered with Cyberange Virtual Labs.
- Knowledge of Industry-level cyber operations, laws, policies and frameworks.
- Explain fundamental concepts such as confidentiality, integrity, and availability in the context of information security.
- Identify common threats, vulnerabilities, and attack vectors targeting information systems and assets.
- Apply risk management principles to assess security risks, prioritize mitigation efforts, and develop risk treatment plans.
- Navigate legal and regulatory requirements related to information security and privacy, ensuring compliance with relevant laws and standards.
- Ability to Identify and respond to security incidents.
- Skills to assume entry-level positions in Security Operations like Cybersecurity analyst, Cybersecurity Engineer, Cybersecurity Consultant and many more.